2017
DOI: 10.1109/tsg.2017.2670144
|View full text |Cite
|
Sign up to set email alerts
|

Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
86
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 187 publications
(87 citation statements)
references
References 28 publications
0
86
0
1
Order By: Relevance
“…Wang et al. () investigate honeypots as defense systems to detect and gather attack information. In particular, they focus on the interactions between the attackers and the defenders and derive optimal strategies for both sides to achieve an optimal defense strategy.…”
Section: Honeypot Basics and Relevant Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Wang et al. () investigate honeypots as defense systems to detect and gather attack information. In particular, they focus on the interactions between the attackers and the defenders and derive optimal strategies for both sides to achieve an optimal defense strategy.…”
Section: Honeypot Basics and Relevant Researchmentioning
confidence: 99%
“…In the honeypot context, defense strategies generally include methods, such as reducing the appeal of the environment to the potential intruders, acquiring a better understanding of the critical vulnerabilities, and enhancing reaction and response capabilities. Wang et al (2017) investigate honeypots as defense systems to detect and gather attack information. In particular, they focus on the interactions between the attackers and the defenders and derive optimal strategies for both sides to achieve an optimal defense strategy.…”
Section: Defensementioning
confidence: 99%
“…As reviewed in [38], the features of the network topology have an important impact in the effectiveness of the source identification approaches, which tend to be problematic in highly non-seasonal environments. Alternatively, traps as honeypots [39], or decoy virtual machines that co-exist with those real in the same physical hosts [40] are deployed. They implement the aforementioned methods, thus providing an additional level of security.…”
Section: Countermeasuresmentioning
confidence: 99%
“…Despite their efficiency, current traditional defense technologies are incapable of counter this type of attack. Therefore, a numerous efforts were conducted to present another transformative security solutions …”
Section: Introductionmentioning
confidence: 99%
“…Therefore, a numerous efforts were conducted to present another transformative security solutions. 17,18 Additionally, the first real and unprecedented kind of DoS attack that targeted the Ukrainian power grid in 2015 and resulted in a widespread outage 19 grabbed the attention of the scientific community to discover new innovated software integrated solutions such as Multi Agent Systems 20,21 and distributed parallel cloud computing techniques for modern power system. 22 In this paper, we developed a top level SDN security application in an SDN-enabled smart grid network to mitigate grid DoS attacks.…”
Section: Introductionmentioning
confidence: 99%