Optimal Honeypot Allocation Using Core Attack Graph in Partially Observable Stochastic Games
This paper presents a scalable solution for zero-sum, one-sided, partially observable stochastic games (Z-POSGs) in the realm of cybersecurity. Existing heuristic search value iteration (HSVI) methods often face significant challenges with scalability in large and complex networks. To overcome this...
Saved in:
| Main Authors: | Achile Leonel Nguemkam, Ahmed Hemida Anwar, Vianney Kengne Tchendji, Deepak K. Tosh, Charles Kamhoua |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10786011/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
CTU Hornet 65 Niner: A network dataset of geographically distributed low-interaction honeypotsMendeley Data
by: Veronica Valeros, et al.
Published: (2025-02-01) -
Detection and Mitigation of Distributed Denial of Service Attacks Using Ensemble Learning and Honeypots in a Novel SDN-UAV Network Architecture
by: Mohamed Amine Ould Rabah, et al.
Published: (2024-01-01) -
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
by: Lihua SONG, et al.
Published: (2022-11-01) -
Application of Honeypot in Network Security for Detecting Cyber Attacks on IT Infrastructure
by: Carlos Susanto, et al.
Published: (2025-06-01) -
Advancing Cybersecurity with Honeypots and Deception Strategies
by: Zlatan Morić, et al.
Published: (2025-01-01)