[1] |
SPITZNER L . Honeypots:tracking hackers[M]. Reading: Addison-Wesley, 2003.
|
[2] |
WAGENER G , DULAUNOY A , ENGEL T . Self adaptive high interaction honeypots driven by game theory[C]// Symposium on Self-Stabilizing Systems. Berlin:Springer, 2009: 741-755.
|
[3] |
HAYATLE O , OTROK H , YOUSSEF A . A game theoretic investigation for high interaction honeypots[C]// Proceedings of 2012 IEEE International Conference on Communications. Piscataway:IEEE Press, 2012: 6662-6667.
|
[4] |
王鹃, 杨泓远, 樊成阳 . 一种基于多阶段攻击响应的SDN动态蜜罐[J]. 信息网络安全, 2021,21(1): 27-40.
|
|
WANG J , YANG H Y , FAN C Y . A SDN dynamic honeypot with multi-phase attack response[J]. Netinfo Security, 2021,21(1): 27-40.
|
[5] |
WAGENER G , STATE R , DULAUNOY A ,et al. Heliza:talking dirty to the attackers[J]. Journal in Computer Virology, 2011,7(3): 221-232.
|
[6] |
PAUNA A , IACOB A C , BICA I . QRASSH - a self-adaptive SSH honeypot driven by Q-learning[C]// Proceedings of 2018 International Conference on Communications (COMM). Piscataway:IEEE Press, 2018: 441-446.
|
[7] |
MNIH V , KAVUKCUOGLU K , SILVER D ,et al. Playing atari with deep reinforcement learning[J]. arXiv Preprint,arXiv:1312.5602, 2013.
|
[8] |
PAUNA A , BICA I , POP F ,et al. On the rewards of self-adaptive IoT honeypots[J]. Annals of Telecommunications, 2019,74(7/8): 501-515.
|
[9] |
DOWLING S , SCHUKAT M , BARRETT E . New framework for adaptive and agile honeypots[J]. ETRI Journal, 2020,42(6): 965-975.
|
[10] |
SURATKAR S , SHAH K , SOOD A ,et al. An adaptive honeypot using Q-learning with severity analyzer[J]. Journal of Ambient Intelligence and Humanized Computing, 2022,13(10): 4865-4876.
|
[11] |
PAWLICK J , ZHU Q . Deception by design:evidence-based signaling games for network defense[J]. arXiv Preprint,arXiv:1503.05458, 2015.
|
[12] |
PAWLICK J , COLBERT E , ZHU Q Y . Modeling and analysis of leaky deception using signaling games with evidence[J]. IEEE Transactions on Information Forensics and Security, 2018,14(7): 1871-1886.
|
[13] |
ZINKEVICH M , JOHANSON M , BOWLING M ,et al. Regret minimization in games with incomplete information[C]// Proceedings of the 20th International Conference on Neural Information Processing Systems. Piscataway:IEEE Press, 2007: 1729-1736.
|
[14] |
BROWN N , LERER A , GROSS S ,et al. Deep counterfactual regret minimization[J]. arXiv Preprint,arXiv:1811.00164, 2018.
|
[15] |
RU Y Q , WANG Y F , LI J E ,et al. Risk assessment of cyber attacks in ECPS based on attack tree and AHP[C]// Proceedings of 2016 12th International Conference on Natural Computation,Fuzzy Systems and Knowledge Discovery (ICNC-FSKD). Piscataway:IEEE Press, 2016: 465-470.
|