Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security
The result's identifiers
Result code in IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F15%3A00239665" target="_blank" >RIV/68407700:21230/15:00239665 - isvavai.cz</a>
Result on the web
<a href="http://link.springer.com/chapter/10.1007/978-3-319-14039-1_5" target="_blank" >http://link.springer.com/chapter/10.1007/978-3-319-14039-1_5</a>
DOI - Digital Object Identifier
<a href="http://dx.doi.org/10.1007/978-3-319-14039-1_5" target="_blank" >10.1007/978-3-319-14039-1_5</a>
Alternative languages
Result language
angličtina
Original language name
Game-theoretic Foundations for the Strategic Use of Honeypots in Network Security
Original language description
An important element in the mathematical and scientific foundations for security is modeling the strategic use of deception and information manipulation. We argue that game theory provides an important theoretical framework for reasoning about information manipulation in adversarial settings, including deception and randomization strategies. In addition, game theory has practical uses in determining optimal strategies for randomized patrolling and resource allocation. We discuss three game-theoretic models that capture aspects of how honeypots can be used in network security. Honeypots are fake hosts introduced into a network to gather information about attackers and to distract them from real targets. They are a limited resource, so there are important strategic questions about how to deploy them to the greatest effect, which is fundamentally about deceiving attackers into choosing fake targets instead of real ones to attack. We describe several game models that address strategies for
Czech name
—
Czech description
—
Classification
Type
J<sub>x</sub> - Unclassified - Peer-reviewed scientific article (Jimp, Jsc and Jost)
CEP classification
JC - Computer hardware and software
OECD FORD branch
—
Result continuities
Project
<a href="/en/project/GAP202%2F12%2F2054" target="_blank" >GAP202/12/2054: Security Games in Extensive Form</a><br>
Continuities
P - Projekt vyzkumu a vyvoje financovany z verejnych zdroju (s odkazem do CEP)
Others
Publication year
2015
Confidentiality
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Data specific for result type
Name of the periodical
Advances in Information Security
ISSN
1568-2633
e-ISSN
—
Volume of the periodical
56
Issue of the periodical within the volume
56
Country of publishing house
DE - GERMANY
Number of pages
21
Pages from-to
81-101
UT code for WoS article
—
EID of the result in the Scopus database
2-s2.0-84927917238