Optimal Honeypot Allocation Using Core Attack Graph in Partially Observable Stochastic Games
This paper presents a scalable solution for zero-sum, one-sided, partially observable stochastic games (Z-POSGs) in the realm of cybersecurity. Existing heuristic search value iteration (HSVI) methods often face significant challenges with scalability in large and complex networks. To overcome this...
Saved in:
Main Authors: | Achile Leonel Nguemkam, Ahmed Hemida Anwar, Vianney Kengne Tchendji, Deepak K. Tosh, Charles Kamhoua |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10786011/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception
by: Lihua SONG, et al.
Published: (2022-11-01) -
HoneyBow:an automated malware collection tool based on the high-interaction honeypot principle
by: ZHUGE Jian-wei1, et al.
Published: (2007-01-01) -
Research on active defense application based on honeypot
by: Dequan YANG, et al.
Published: (2018-01-01) -
An Enhanced LSTM Approach for Detecting IoT-Based DDoS Attacks Using Honeypot Data
by: Arjun Kumar Bose Arnob, et al.
Published: (2025-02-01) -
Honeypot contract detection of blockchain based on deep learning
by: Hongxia ZHANG, et al.
Published: (2022-01-01)