. . . "Lis\u00FD, Viliam" . . "Bo\u0161ansk\u00FD, Branislav" . . "4"^^ . . . "Springer-Verlag, GmbH" . "honeypots; game theory; network security; deception"@en . . "2012-11-05+01:00"^^ . "Heidelberg" . . "P\u011Bchou\u010Dek, Michal" . "P\u00EDbil, Radek" . "http://www.springer.com/computer/database+management+%26+information+retrieval/book/978-3-642-34265-3" . "5"^^ . "RIV/68407700:21230/12:00197018!RIV13-MSM-21230___" . . "137695" . . "978-3-642-34265-3" . "Lis\u00FD, Viliam" . . . "Game Theoretic Model of Strategic Honeypot Selection in Computer Networks"@en . "10.1007/978-3-642-34266-0_12" . "A honeypot is a decoy computer system used in network security to waste the time and resources of attackers and to analyze their behaviors. While there has been significant research on how to design honeypot systems, less is known about how to use honeypots strategically in network defense. Based on formal deception games, we develop two game-theoretic models that provide insight into how valuable should honeypots look like to maximize the probability that a rational attacker will attack a honeypot. The first model captures a static situation and the second allows attackers to imperfectly probe some of the systems on the network to determine which ones are likely to be real systems (and not honeypots) before launching an attack. We formally analyze the properties of the optimal strategies in the games and provide linear programs for their computation. Finally, we present the optimal solutions for a set of instances of the games and evaluate their quality in comparison to several baselines."@en . "Kiekintveld, C. D." . "[347F146BA9BD]" . . "21230" . "Game Theoretic Model of Strategic Honeypot Selection in Computer Networks"@en . . . "Game Theoretic Model of Strategic Honeypot Selection in Computer Networks" . "Decision and Game Theory for Security" . . "A honeypot is a decoy computer system used in network security to waste the time and resources of attackers and to analyze their behaviors. While there has been significant research on how to design honeypot systems, less is known about how to use honeypots strategically in network defense. Based on formal deception games, we develop two game-theoretic models that provide insight into how valuable should honeypots look like to maximize the probability that a rational attacker will attack a honeypot. The first model captures a static situation and the second allows attackers to imperfectly probe some of the systems on the network to determine which ones are likely to be real systems (and not honeypots) before launching an attack. We formally analyze the properties of the optimal strategies in the games and provide linear programs for their computation. Finally, we present the optimal solutions for a set of instances of the games and evaluate their quality in comparison to several baselines." . . "0302-9743" . "Game Theoretic Model of Strategic Honeypot Selection in Computer Networks" . "Budapest" . "Bo\u0161ansk\u00FD, Branislav" . . "RIV/68407700:21230/12:00197018" . "20"^^ . . "P(GAP202/12/2054), V" .