This HTML5 document contains 52 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n24http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n20http://localhost/temp/predkladatel/
n11http://purl.org/net/nknouf/ns/bibtex#
n8http://linked.opendata.cz/resource/domain/vavai/projekt/
n7http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n10http://linked.opendata.cz/resource/domain/vavai/subjekt/
n9http://linked.opendata.cz/ontology/domain/vavai/
n17http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F68407700%3A21230%2F12%3A00197018%21RIV13-MSM-21230___/
n16https://schema.org/
shttp://schema.org/
rdfshttp://www.w3.org/2000/01/rdf-schema#
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n18http://bibframe.org/vocab/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n4http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n6http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n22http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n12http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n21http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n15http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n5http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F68407700%3A21230%2F12%3A00197018%21RIV13-MSM-21230___
rdf:type
skos:Concept n9:Vysledek
rdfs:seeAlso
http://www.springer.com/computer/database+management+%26+information+retrieval/book/978-3-642-34265-3
dcterms:description
A honeypot is a decoy computer system used in network security to waste the time and resources of attackers and to analyze their behaviors. While there has been significant research on how to design honeypot systems, less is known about how to use honeypots strategically in network defense. Based on formal deception games, we develop two game-theoretic models that provide insight into how valuable should honeypots look like to maximize the probability that a rational attacker will attack a honeypot. The first model captures a static situation and the second allows attackers to imperfectly probe some of the systems on the network to determine which ones are likely to be real systems (and not honeypots) before launching an attack. We formally analyze the properties of the optimal strategies in the games and provide linear programs for their computation. Finally, we present the optimal solutions for a set of instances of the games and evaluate their quality in comparison to several baselines. A honeypot is a decoy computer system used in network security to waste the time and resources of attackers and to analyze their behaviors. While there has been significant research on how to design honeypot systems, less is known about how to use honeypots strategically in network defense. Based on formal deception games, we develop two game-theoretic models that provide insight into how valuable should honeypots look like to maximize the probability that a rational attacker will attack a honeypot. The first model captures a static situation and the second allows attackers to imperfectly probe some of the systems on the network to determine which ones are likely to be real systems (and not honeypots) before launching an attack. We formally analyze the properties of the optimal strategies in the games and provide linear programs for their computation. Finally, we present the optimal solutions for a set of instances of the games and evaluate their quality in comparison to several baselines.
dcterms:title
Game Theoretic Model of Strategic Honeypot Selection in Computer Networks Game Theoretic Model of Strategic Honeypot Selection in Computer Networks
skos:prefLabel
Game Theoretic Model of Strategic Honeypot Selection in Computer Networks Game Theoretic Model of Strategic Honeypot Selection in Computer Networks
skos:notation
RIV/68407700:21230/12:00197018!RIV13-MSM-21230___
n9:predkladatel
n10:orjk%3A21230
n3:aktivita
n12:V n12:P
n3:aktivity
P(GAP202/12/2054), V
n3:dodaniDat
n5:2013
n3:domaciTvurceVysledku
n7:9170774 Lisý, Viliam n7:2490013 Bošanský, Branislav
n3:druhVysledku
n21:D
n3:duvernostUdaju
n6:S
n3:entitaPredkladatele
n17:predkladatel
n3:idSjednocenehoVysledku
137695
n3:idVysledku
RIV/68407700:21230/12:00197018
n3:jazykVysledku
n22:eng
n3:klicovaSlova
honeypots; game theory; network security; deception
n3:klicoveSlovo
n4:network%20security n4:deception n4:game%20theory n4:honeypots
n3:kontrolniKodProRIV
[347F146BA9BD]
n3:mistoKonaniAkce
Budapest
n3:mistoVydani
Heidelberg
n3:nazevZdroje
Decision and Game Theory for Security
n3:obor
n15:IN
n3:pocetDomacichTvurcuVysledku
4
n3:pocetTvurcuVysledku
5
n3:projekt
n8:GAP202%2F12%2F2054
n3:rokUplatneniVysledku
n5:2012
n3:tvurceVysledku
Lisý, Viliam Bošanský, Branislav Pěchouček, Michal Píbil, Radek Kiekintveld, C. D.
n3:typAkce
n24:WRD
n3:zahajeniAkce
2012-11-05+01:00
s:issn
0302-9743
s:numberOfPages
20
n18:doi
10.1007/978-3-642-34266-0_12
n11:hasPublisher
Springer-Verlag, GmbH
n16:isbn
978-3-642-34265-3
n20:organizacniJednotka
21230