This paper presents a systematic study on the cybersecurity effectiveness of blending honeypot computers into production computers. The authors formalize the Honeypot Deployment (HD) problem as a combinatorial optimization problem, proving its NP-hardness and providing a near-optimal algorithm. The goal is to maximize the utility of honeypots in revealing new cyber attacks, while minimizing the potential loss to the defender in terms of compromised digital assets. This research has implications for the strategic deployment of honeypots in cybersecurity.

 

Publication date: 12 Jan 2024
Project Page: https://arxiv.org/abs/2401.06763v1
Paper: https://arxiv.org/pdf/2401.06763