A Game-Theoretic Approach for Network Security Using Honeypots

نویسندگان

چکیده

Cybersecurity plays an increasing role in today’s digital space, and its methods must keep pace with the changes. Both public private sector researchers have put efforts into strengthening security of networks by proposing new approaches. This paper presents a method to solve game theory model defining contents payoff matrix incorporating honeypots defense strategy. Using probabilistic approach we propose course-of-action Stackelberg (CoASG), where every path graph leads undesirable state based on issues found host. The reality system is represented cost function which helps us define find best possible combination strategies once run. results show benefits using this early prevention stages for detecting cyberattack patterns.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security

An important element in the mathematical and scientific foundations for security is modeling the strategic use of deception and information manipulation. We argue that game theory provides an important theoretical framework for reasoning about information manipulation in adversarial settings, including deception and randomization strategies. In addition, game theory has practical uses in determ...

متن کامل

A Graph-Theoretic Network Security Game

Consider a network vulnerable to viral infection, where the security software can guarantee safety only to a limited part of it. We model this practical network scenario as a non-cooperative multiplayer game on a graph, with two kinds of players, a set of attackers and a protector player, representing the viruses and the system security software, respectively. Each attacker player chooses a nod...

متن کامل

Competitive Pricing in a Supply Chain Using a Game Theoretic Approach

We develop a price competition model for a new supply chain that competes in a market comprised of some rival supply chains. The new supply chain has one risk-neutral manufacturer and one risk-averse retailer in which the manufacturer is a leader and retailer is a follower. The manufacturer pays a fraction of the risk cost (caused by demand uncertainty) to the retailer. We apply this competitiv...

متن کامل

Honeypots in Network Security

Computer Network and Internet is growing every day. Computer networks allow communicating faster than any other facilities. These networks allow the user to access local and remote databases. It is impossible to protect every system on the network. In industries, the network and its security are important issues, as a breach in the system can cause major problems. Intrusion detection system (ID...

متن کامل

Design of Network Security Projects Using Honeypots

Honeypots are closely monitored decoys that are employed in a network to study the trail of hackers and to alert network administrators of a possible intrusion. Using honeypots provides a cost-effective solution to increase the security posture of an organization. Even though it is not a panacea for security breaches, it is useful as a tool for network forensics and intrusion detection. Nowaday...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Future Internet

سال: 2022

ISSN: ['1999-5903']

DOI: https://doi.org/10.3390/fi14120362