A Deception Planning Framework for Cyber Defense

[1]  Adrian Perrig,et al.  The Coremelt Attack , 2009, ESORICS.

[2]  Philippe Jehiel,et al.  A theory of deception , 2010 .

[3]  Tomas Sochor,et al.  Study of Internet Threats and Attack Methods Using Honeypots and Honeynets , 2014, CN.

[4]  Felix C. Freiling,et al.  The Nepenthes Platform: An Efficient Approach to Collect Malware , 2006, RAID.

[5]  Oguzhan Alagöz,et al.  Modeling secrecy and deception in a multiple-period attacker-defender signaling game , 2010, Eur. J. Oper. Res..

[6]  Chiaki Sakama,et al.  A formal account of dishonesty , 2015, Log. J. IGPL.

[7]  Daniel Grosu,et al.  A Game Theoretic Investigation of Deception in Network Security , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[8]  Neil C. Rowe,et al.  Designing good deceptions in defense of information systems , 2004, 20th Annual Computer Security Applications Conference.

[9]  N. Garg,et al.  Deception in Honeynets: A Game-Theoretic Analysis , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.