kth.sePublications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Comparison of Strategies for Honeypot Deployment
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS. FOI Swedish Def Res Agcy, SE-16490 Stockholm, Sweden..ORCID iD: 0000-0002-2677-9759
KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Theoretical Computer Science, TCS. FOI Swedish Def Res Agcy, SE-16490 Stockholm, Sweden..
FOI Swedish Def Res Agcy, SE-16490 Stockholm, Sweden..
Show others and affiliations
2023 (English)In: Proceedings Of The 2023 Ieee/Acm International Conference On Advances In Social Networks Analysis And Mining, Asonam 2023 / [ed] Prakash, BA Wang, D Weninger, T, Association for Computing Machinery (ACM) , 2023, p. 612-619Conference paper, Published paper (Refereed)
Abstract [en]

Recent experimental studies have explored how well adaptive honeypot allocation strategies defend against human adversaries. As the experimental subjects were drawn from an unknown, nondescript pool of subjects using Amazon Mechanical Turk, the relevance to defense against real-world adversaries is unclear. The present study reproduces the experiments with more relevant experimental subjects. The results suggest that the strategies considered are less effective against attackers from the current population. In particular, their ability to predict the next attack decreased steadily over time, that is, the human subjects from this population learned to attack less and less predictably.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM) , 2023. p. 612-619
Series
Proceedings of the IEEE-ACM International Conference on Advances in Social Networks Analysis and Mining, ISSN 2473-9928
Keywords [en]
Cybersecurity, honeypot, game theory, defense strategy, behavioral learning
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:kth:diva-345925DOI: 10.1145/3625007.3631602ISI: 001191293500097Scopus ID: 2-s2.0-85190627573OAI: oai:DiVA.org:kth-345925DiVA, id: diva2:1854728
Conference
15th IEEE/ACM Annual International Conference on Advances in Social Networks Analysis and Mining (ASONAM), NOV 06-09, 2023, Kusadasi, Turkey
Note

Part of proceedings ISBN: 979-840070409-3

QC 20240426

Available from: 2024-04-26 Created: 2024-04-26 Last updated: 2024-04-26Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Brynielsson, JoelCohen, MikaLavebrink, SamuelTjörnhammar, Edward

Search in DiVA

By author/editor
Brynielsson, JoelCohen, MikaLavebrink, SamuelLindström, MadeleineTjörnhammar, Edward
By organisation
Theoretical Computer Science, TCSKTHSoftware and Computer systems, SCS
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 51 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf