As one of the active defense technologies, the honeypot deceives the latent intruders to interact with the imitated systems or networks deployed with security mechanisms. Its modeling and performance analysis have not been well studied. In this paper, we propose a honeypot performance evaluation scheme based on Stochastic Petri Nets (SPN). We firstly set up performance evaluation models for three types of defense scenarios (i.e., firewall; firewall and Intrusion Detection System (IDS); firewall, IDS and honeypot) based on SPN. We then theoretically analyze the SPN models by constructing Markov Chains (MC), which are isomorphic to the models. With the steady state probabilities based on the MC, the system performance evaluation is done with ...
Abstract—Over the past several years, honeynets have proven invaluable for understanding the charact...
The processor systems are modelled and analysed by stochastic Petri nets. The analysis is based on t...
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyb...
According to some experts, organizations make investments of huge sum of dollars concerning firewall...
Nowadays, honeypots are a key tool to attract attackers and study their activity. They help us in th...
Protection schemes are modelled through Petri Nets, in order to carry out performance evaluation. Ma...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
Botnets have become one of the major attacks in the internet today due to their illicit profitable f...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
Abstract—Rigorously characterizing the statistical properties of cyber attacks is an important probl...
Honeypots are more and more used to collect data on malicious activities on the Internet and to bett...
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited...
Because botnets can be used for illicit financial gain, they have become quite popular in recent I...
Abstract. Generalised Stochastic Petri Nets (GSPNs) are a widely used mod-eling formalism in the fie...
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited...
Abstract—Over the past several years, honeynets have proven invaluable for understanding the charact...
The processor systems are modelled and analysed by stochastic Petri nets. The analysis is based on t...
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyb...
According to some experts, organizations make investments of huge sum of dollars concerning firewall...
Nowadays, honeypots are a key tool to attract attackers and study their activity. They help us in th...
Protection schemes are modelled through Petri Nets, in order to carry out performance evaluation. Ma...
This study proposes a stochastic Petri net model for evaluating the security and resilience of cyber...
Botnets have become one of the major attacks in the internet today due to their illicit profitable f...
Observation, characterization and modeling of attack pro- cesses on the Internet The development of ...
Abstract—Rigorously characterizing the statistical properties of cyber attacks is an important probl...
Honeypots are more and more used to collect data on malicious activities on the Internet and to bett...
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited...
Because botnets can be used for illicit financial gain, they have become quite popular in recent I...
Abstract. Generalised Stochastic Petri Nets (GSPNs) are a widely used mod-eling formalism in the fie...
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited...
Abstract—Over the past several years, honeynets have proven invaluable for understanding the charact...
The processor systems are modelled and analysed by stochastic Petri nets. The analysis is based on t...
Honeypots are computer systems deliberately designed to be attack targets, mainly to learn about cyb...