The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2023
DOI: 10.1007/978-3-031-50670-3_10
|View full text |Cite
|
Sign up to set email alerts
|

Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach

Md Abu Sayed,
Ahmed H. Anwar,
Christopher Kiekintveld
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…3. For this 20node network, the defender has 10 actions for honeypot allocations including (6,12), (5,11), (16,19), (11,15), (0,5), (16,20), (12,16), (0,6), (15,19), (15,18), while the attacker selects between 4 attack paths: path1 = [0, 5,11,15,18], path2 = [0, 5,11,15,19], path3 = [0, 6,12,16,19], path4 = [0, 6,12,16,20].…”
Section: Numerical Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…3. For this 20node network, the defender has 10 actions for honeypot allocations including (6,12), (5,11), (16,19), (11,15), (0,5), (16,20), (12,16), (0,6), (15,19), (15,18), while the attacker selects between 4 attack paths: path1 = [0, 5,11,15,18], path2 = [0, 5,11,15,19], path3 = [0, 6,12,16,19], path4 = [0, 6,12,16,20].…”
Section: Numerical Resultsmentioning
confidence: 99%
“…The synergies between game theory and machine learning to formulate defensive deception discussed in (Zhu et al 2021). A game-theoretic approach for strategically allocating honeypots in dynamic tactical networks to enhance cyber deception is presented in (Sayed et al 2023).…”
Section: Game Theoretic Deceptionmentioning
confidence: 99%
See 1 more Smart Citation