All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Approximate Solutions for Attack Graph Games with Imperfect Information

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F15%3A00234380" target="_blank" >RIV/68407700:21230/15:00234380 - isvavai.cz</a>

  • Result on the web

    <a href="http://link.springer.com/chapter/10.1007/978-3-319-25594-1_13" target="_blank" >http://link.springer.com/chapter/10.1007/978-3-319-25594-1_13</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-319-25594-1_13" target="_blank" >10.1007/978-3-319-25594-1_13</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Approximate Solutions for Attack Graph Games with Imperfect Information

  • Original language description

    We study the problem of network security hardening, in which a network administrator decides what security measures to use to best improve the security of the network. Specifically, we focus on deploying decoy services or hosts called honeypots. We modelthe problem as a general-sum extensive-form game with imperfect information and seek a solution in the form of Stackelberg Equilibrium. The defender seeks the optimal randomized honeypot deployment in a specific computer network, while the attacker chooses the best response as a contingency attack policy from a library of possible attacks compactly represented by attack graphs. Computing an exact Stackelberg Equilibrium using standard mixed-integer linear programming has a limited scalability in this game. We propose a set of approximate solution methods and analyze the trade-off between the computation time and the quality of the strategies calculated.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

    IN - Informatics

  • OECD FORD branch

Result continuities

  • Project

  • Continuities

    V - Vyzkumna aktivita podporovana z jinych verejnych zdroju

Others

  • Publication year

    2015

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    Decision and Game Theory for Security

  • ISBN

    978-3-319-25593-4

  • ISSN

    0302-9743

  • e-ISSN

  • Number of pages

    22

  • Pages from-to

    228-249

  • Publisher name

    Springer

  • Place of publication

    London

  • Event location

    London

  • Event date

    Nov 4, 2015

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article