Game theoretic model of strategic honeypot selection in computer networks
DOI10.1007/978-3-642-34266-0_12zbMATH Open1377.68025OpenAlexW145844368WikidataQ59209614 ScholiaQ59209614MaRDI QIDQ4909438FDOQ4909438
Authors: Radek Píbil, Viliam Lisý, Christopher Kiekintveld, Branislav Bošanský, Michal Pěchouček
Publication date: 13 March 2013
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-34266-0_12
Recommendations
- Optimal placement of honeypots for network defense
- Honeynet games: A game theoretic approach to defending network monitors
- An Attacker-Defender Game for Honeynets
- Об оптимальной конфигурации обманных систем в компьютерной сети предприятия
- Approximate solutions for attack graph games with imperfect information
Applications of game theory (91A80) Other game-theoretic models (91A40) Network design and communication in computer systems (68M10)
Cited In (12)
- Deception-based game theoretical approach to mitigate DoS attacks
- Об оптимальной конфигурации обманных систем в компьютерной сети предприятия
- Learning hidden Markov models for linear Gaussian systems with applications to event-based state estimation
- Game Theory and Cyber Defense
- A Game-Theoretical Approach for Finding Optimal Strategies in a Botnet Defense Model
- Optimal placement of honeypots for network defense
- Rationalization of detection of the multiple disorders
- Approximate solutions for attack graph games with imperfect information
- Decoy allocation games on graphs with temporal logic objectives
- An Attacker-Defender Game for Honeynets
- Learning Generative Deception Strategies in Combinatorial Masking Games
- Honeynet games: A game theoretic approach to defending network monitors
Uses Software
This page was built for publication: Game theoretic model of strategic honeypot selection in computer networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4909438)