A Game-Theoretic Approach for Network Security Using Honeypots
نویسندگان
چکیده
Cybersecurity plays an increasing role in today’s digital space, and its methods must keep pace with the changes. Both public private sector researchers have put efforts into strengthening security of networks by proposing new approaches. This paper presents a method to solve game theory model defining contents payoff matrix incorporating honeypots defense strategy. Using probabilistic approach we propose course-of-action Stackelberg (CoASG), where every path graph leads undesirable state based on issues found host. The reality system is represented cost function which helps us define find best possible combination strategies once run. results show benefits using this early prevention stages for detecting cyberattack patterns.
منابع مشابه
Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security
An important element in the mathematical and scientific foundations for security is modeling the strategic use of deception and information manipulation. We argue that game theory provides an important theoretical framework for reasoning about information manipulation in adversarial settings, including deception and randomization strategies. In addition, game theory has practical uses in determ...
متن کاملA Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection, where the security software can guarantee safety only to a limited part of it. We model this practical network scenario as a non-cooperative multiplayer game on a graph, with two kinds of players, a set of attackers and a protector player, representing the viruses and the system security software, respectively. Each attacker player chooses a nod...
متن کاملCompetitive Pricing in a Supply Chain Using a Game Theoretic Approach
We develop a price competition model for a new supply chain that competes in a market comprised of some rival supply chains. The new supply chain has one risk-neutral manufacturer and one risk-averse retailer in which the manufacturer is a leader and retailer is a follower. The manufacturer pays a fraction of the risk cost (caused by demand uncertainty) to the retailer. We apply this competitiv...
متن کاملHoneypots in Network Security
Computer Network and Internet is growing every day. Computer networks allow communicating faster than any other facilities. These networks allow the user to access local and remote databases. It is impossible to protect every system on the network. In industries, the network and its security are important issues, as a breach in the system can cause major problems. Intrusion detection system (ID...
متن کاملDesign of Network Security Projects Using Honeypots
Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Nowaday...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Internet
سال: 2022
ISSN: ['1999-5903']
DOI: https://doi.org/10.3390/fi14120362