Comparison of Strategies for Honeypot DeploymentShow others and affiliations
2023 (English)In: Proceedings Of The 2023 Ieee/Acm International Conference On Advances In Social Networks Analysis And Mining, Asonam 2023 / [ed] Prakash, BA Wang, D Weninger, T, Association for Computing Machinery (ACM) , 2023, p. 612-619Conference paper, Published paper (Refereed)
Abstract [en]
Recent experimental studies have explored how well adaptive honeypot allocation strategies defend against human adversaries. As the experimental subjects were drawn from an unknown, nondescript pool of subjects using Amazon Mechanical Turk, the relevance to defense against real-world adversaries is unclear. The present study reproduces the experiments with more relevant experimental subjects. The results suggest that the strategies considered are less effective against attackers from the current population. In particular, their ability to predict the next attack decreased steadily over time, that is, the human subjects from this population learned to attack less and less predictably.
Place, publisher, year, edition, pages
Association for Computing Machinery (ACM) , 2023. p. 612-619
Series
Proceedings of the IEEE-ACM International Conference on Advances in Social Networks Analysis and Mining, ISSN 2473-9928
Keywords [en]
Cybersecurity, honeypot, game theory, defense strategy, behavioral learning
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:kth:diva-345925DOI: 10.1145/3625007.3631602ISI: 001191293500097Scopus ID: 2-s2.0-85190627573OAI: oai:DiVA.org:kth-345925DiVA, id: diva2:1854728
Conference
15th IEEE/ACM Annual International Conference on Advances in Social Networks Analysis and Mining (ASONAM), NOV 06-09, 2023, Kusadasi, Turkey
Note
Part of proceedings ISBN: 979-840070409-3
QC 20240426
2024-04-262024-04-262024-04-26Bibliographically approved