L Zobal, D Kolář, R Fujdiak - 2019 11th International Congress …, 2019 - ieeexplore.ieee.org
This article surveys honeypot problematics and deception-based defensive strategies in the cyberworld. First, we define the honeypot phenomenon and summarize it's advantages and …
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false detections. By diverting the …
W Tian, M Du, X Ji, G Liu, Y Dai… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Software-defined networking (SDN) has become a promising trend for managing the Industrial Internet of Things (IIoT) devices. As the core of sensitive data storage and …
Honeypots play a crucial role in implementing various cyber deception techniques as they possess the capability to divert attackers away from valuable assets. Careful strategic …
In this paper, we propose a scalable algorithm to allocate honeypots over an attack graph. We formulate a two-person zero-sum strategic game between the network defender and an …
Cyber deception aims to misrepresent the state of the network to mislead the attackers, falsify their reconnaissance conclusions, and deflect them away from their goals. Honeypots …
A honeypot is a decoy computer system used in network security to waste the time and resources of attackers and to analyze their behaviors. While there has been significant …
Q Li, J Hou, S Meng, H Long - Complexity, 2020 - Wiley Online Library
The real‐time and high‐continuity requirements of the edge computing network gain more and more attention because of its active defence problem, that is, a data‐driven complex …
Practically, a botnet is spread over the Internet of Things (IoT) to ensure an attacker the control of a large number of devices. In this context, in which IoT users react to protect their …