Effective Proactive and Reactive Defense Strategies against Malicious Attacks in a Virtualized Honeynet
Author
Abstract
Suggested Citation
DOI: 10.1155/2013/518213
Download full text from publisher
References listed on IDEAS
- Levitin, Gregory & Hausken, Kjell, 2011. "Preventive strike vs. false targets and protection in defense strategy," Reliability Engineering and System Safety, Elsevier, vol. 96(8), pages 912-924.
- Stergios Skaperdas, 1996.
"Contest success functions (*),"
Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290.
- Skaperdas, Stergios, 1996. "Contest Success Functions," Economic Theory, Springer;Society for the Advancement of Economic Theory (SAET), vol. 7(2), pages 283-290, February.
- Stergios Skaperdas, 1996. "Contest success functions," Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 263-270, Springer.
- Levitin, Gregory & Hausken, Kjell, 2009. "False targets efficiency in defense strategy," European Journal of Operational Research, Elsevier, vol. 194(1), pages 155-162, April.
- Hausken, Kjell & Levitin, Gregory, 2009. "Protection vs. false targets in series systems," Reliability Engineering and System Safety, Elsevier, vol. 94(5), pages 973-981.
- Jack Hirshleifer, 1989.
"Conflict and rent-seeking success functions: Ratio vs. difference models of relative success,"
Springer Books, in: Roger D. Congleton & Arye L. Hillman & Kai A. Konrad (ed.), 40 Years of Research on Rent Seeking 1, pages 251-262,
Springer.
- Jack Hirshleifer, 1989. "Conflict and rent-seeking success functions: Ratio vs. difference models of relative success," Public Choice, Springer, vol. 63(2), pages 101-112, November.
Most related items
These are the items that most often cite the same works as this one and are cited by the same works as this one.- Levitin, Gregory & Hausken, Kjell, 2011. "Is it wise to protect false targets?," Reliability Engineering and System Safety, Elsevier, vol. 96(12), pages 1647-1656.
- Wang, Bin & Kou, Gang & Xiao, Hui, 2025. "Defending a series signaling system against uncertain attack time with individual protection, false nodes, and overarching protection," Reliability Engineering and System Safety, Elsevier, vol. 264(PA).
- Peiqiu Guan & Meilin He & Jun Zhuang & Stephen C. Hora, 2017. "Modeling a Multitarget Attacker–Defender Game with Budget Constraints," Decision Analysis, INFORMS, vol. 14(2), pages 87-107, June.
- Chen, Die & Xu, Maochao & Shi, Weidong, 2018. "Defending a cyber system with early warning mechanism," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 224-234.
- Qingqing Zhai & Rui Peng & Jun Zhuang, 2020. "Defender–Attacker Games with Asymmetric Player Utilities," Risk Analysis, John Wiley & Sons, vol. 40(2), pages 408-420, February.
- Wu, Di & Xiao, Hui & Peng, Rui, 2018. "Object defense with preventive strike and false targets," Reliability Engineering and System Safety, Elsevier, vol. 169(C), pages 76-80.
- Peng, Rui & Xiao, Hui & Guo, Jianjun & Lin, Chen, 2020. "Defending a parallel system against a strategic attacker with redundancy, protection and disinformation," Reliability Engineering and System Safety, Elsevier, vol. 193(C).
- Levitin, Gregory & Hausken, Kjell, 2013. "Is it wise to leave some false targets unprotected?," Reliability Engineering and System Safety, Elsevier, vol. 112(C), pages 176-186.
- Gao, Kaiye & Yan, Xiangbin & Liu, Xiang-dong & Peng, Rui, 2019. "Object defence of a single object with preventive strike of random effect," Reliability Engineering and System Safety, Elsevier, vol. 186(C), pages 209-219.
- Peng, R. & Zhai, Q.Q. & Levitin, G., 2016. "Defending a single object against an attacker trying to detect a subset of false targets," Reliability Engineering and System Safety, Elsevier, vol. 149(C), pages 137-147.
- Zhang, Xiaoxiong & Ding, Song & Ge, Bingfeng & Xia, Boyuan & Pedrycz, Witold, 2021. "Resource allocation among multiple targets for a defender-attacker game with false targets consideration," Reliability Engineering and System Safety, Elsevier, vol. 211(C).
- Felix Reichel, 2025. "Two-Stage Asymmetric Tullock Contests with Cost Shifters and Endogenous Continuation Decision," Papers 2510.00349, arXiv.org.
- Yang-Ming Chang, 2012. "Strategic transfers, redistributive fiscal policies, and family bonds: a micro-economic analysis," Journal of Population Economics, Springer;European Society for Population Economics, vol. 25(4), pages 1481-1502, October.
- Jason A. Winfree, 2021. "If You Don'T Like The Outcome, Change The Contest," Economic Inquiry, Western Economic Association International, vol. 59(1), pages 329-343, January.
- Maxime Menuet, 2024. "Natural Resources, Civil Conflicts, and Economic Growth," GREDEG Working Papers 2024-05, Groupe de REcherche en Droit, Economie, Gestion (GREDEG CNRS), Université Côte d'Azur, France.
- de Miguel-Arribas, A. & Morón-Vidal, J. & Floría, L.M. & Gracia-Lázaro, C. & Hernández, L. & Moreno, Y., 2024. "Contests in two fronts," Chaos, Solitons & Fractals, Elsevier, vol. 179(C).
- Klaus Heine & Maximilian Kerk, 2017. "Conflict resolution in meta-organizations: the peculiar role of arbitration," Journal of Organization Design, Springer;Organizational Design Community, vol. 6(1), pages 1-20, December.
- Gil S Epstein, 2012. "Employer’s information and promotion-seeking activities," Economics and Business Letters, Oviedo University Press, vol. 1(4), pages 21-32.
- Raul Caruso, 2008.
"Reciprocity in the shadow of threat,"
International Review of Economics, Springer;Happiness Economics and Interpersonal Relations (HEIRS), vol. 55(1), pages 91-111, April.
- Caruso, Raul, 2007. "Recirpcity in the shadow of Threat," MPRA Paper 1788, University Library of Munich, Germany.
- Michelle R. Garfinkel & Stergios Skaperdas & Constantinos Syropoulos, 2009.
"International Trade and Transnational Insecurity: How Comparative Advantage and Power are Jointly Determined,"
Working Papers
080921, University of California-Irvine, Department of Economics.
- Michelle R. Garfinkel & Stergios Skaperdas & Constantinos Syropoulos, 2009. "International Trade and Transnational Insecurity: How Comparative Advantage and Power are Jointly Determined," CESifo Working Paper Series 2680, CESifo.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hin:jnljam:518213. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Mohamed Abdelhakeem (email available below). General contact details of provider: https://www.hindawi.com .
Please note that corrections may take a couple of weeks to filter through the various RePEc services.
Printed from https://ideas.repec.org/a/hin/jnljam/518213.html