Deceptive attack and defense game in honeypot-enabled networks for the internet of things

QD La, TQS Quek, J Lee, S Jin… - IEEE Internet of Things …, 2016 - ieeexplore.ieee.org
In modern days, breakthroughs in information and communications technologies lead to
more and more devices of every imaginable type being connected to the Internet. This also …

Current state of honeypots and deception strategies in cybersecurity

L Zobal, D Kolář, R Fujdiak - 2019 11th International Congress …, 2019 - ieeexplore.ieee.org
This article surveys honeypot problematics and deception-based defensive strategies in the
cyberworld. First, we define the honeypot phenomenon and summarize it's advantages and …

[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

Honeypot detection strategy against advanced persistent threats in industrial internet of things: A prospect theoretic game

W Tian, M Du, X Ji, G Liu, Y Dai… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Software-defined networking (SDN) has become a promising trend for managing the
Industrial Internet of Things (IIoT) devices. As the core of sensitive data storage and …

Honeypot allocation for cyber deception in dynamic tactical networks: A game theoretic approach

MA Sayed, AH Anwar, C Kiekintveld… - … Conference on Decision …, 2023 - Springer
Honeypots play a crucial role in implementing various cyber deception techniques as they
possess the capability to divert attackers away from valuable assets. Careful strategic …

Honeypot allocation over attack graphs in cyber deception games

AH Anwar, C Kamhoua, N Leslie - … International Conference on …, 2020 - ieeexplore.ieee.org
In this paper, we propose a scalable algorithm to allocate honeypots over an attack graph.
We formulate a two-person zero-sum strategic game between the network defender and an …

Honeypot allocation for cyber deception under uncertainty

AH Anwar, CA Kamhoua, NO Leslie… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Cyber deception aims to misrepresent the state of the network to mislead the attackers,
falsify their reconnaissance conclusions, and deflect them away from their goals. Honeypots …

Game theoretic model of strategic honeypot selection in computer networks

R Píbil, V Lisý, C Kiekintveld, B Bošanský… - Decision and Game …, 2012 - Springer
A honeypot is a decoy computer system used in network security to waste the time and
resources of attackers and to analyze their behaviors. While there has been significant …

GLIDE: A Game Theory and Data‐Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks

Q Li, J Hou, S Meng, H Long - Complexity, 2020 - Wiley Online Library
The real‐time and high‐continuity requirements of the edge computing network gain more
and more attention because of its active defence problem, that is, a data‐driven complex …

Game-theoretic modeling of cyber deception against epidemic botnets in internet of things

O Tsemogne, Y Hayel, C Kamhoua… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Practically, a botnet is spread over the Internet of Things (IoT) to ensure an attacker the
control of a large number of devices. In this context, in which IoT users react to protect their …