Efficient defense strategies to minimize attackers' success probabilities in honeynet

@article{Lin2010EfficientDS,
  title={Efficient defense strategies to minimize attackers' success probabilities in honeynet},
  author={Frank Yeong-Sung Lin and Yu-Shun Wang and Po-Hao Tsang},
  journal={2010 Sixth International Conference on Information Assurance and Security},
  year={2010},
  pages={80-85}
}
In this paper, we consider the problem of minimizing attackers' success probability in a protected network subject to attacker profile/behavior constraints and defender resource/strategy constraints. Compared with previous research, the following two enhancements are made. First, we no longer assume that perfect knowledge regarding the network topology and defense resource allocation is fully available for attackers (a worst case scenario for the defender). Second, all combinations of attacker… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-4 OF 4 CITATIONS

An Adaptive Honeypot Deployment Algorithm Based on Learning Automata

  • 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC)
  • 2017
VIEW 4 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

A Study on a Sequential One-Defender-N-Attacker Game.

  • Risk analysis : an official publication of the Society for Risk Analysis
  • 2019

References

Publications referenced by this paper.
SHOWING 1-10 OF 12 REFERENCES

False targets efficiency in defense strategy

  • European Journal of Operational Research
  • 2009
VIEW 2 EXCERPTS

2008 CSI Computer Crime & Security Survey

R. Richardson, CSI Director
  • 2008.
  • 2008
VIEW 2 EXCERPTS

A Survivability Quantitative Analysis Model for Network System Based on Attack Graph

  • 2007 International Conference on Machine Learning and Cybernetics
  • 2007
VIEW 2 EXCERPTS

Near Optimal Protection Strategies Against Targeted Attacks on the Core Node of a Network

  • The Second International Conference on Availability, Reliability and Security (ARES'07)
  • 2007
VIEW 3 EXCERPTS