Optimal Placement of Honeypots for Network Defense

We seek to combine recent advances in game theory of both cyber defense and deception to model the interactions between an attacker and defender on a network. We define a new class of games called \((n,k,c,{\varvec{w}}, \gamma )\)-honeynet games which extend those defined in previous research. These games have incomplete and imperfect information since the attacker is unaware of moves made by the defender to secure a system, and the defender is not certain of the true identity of the attacker.