Countering information threats using honeypot systems based on graph of potential attacks

Network and telecommunication security
Authors:
Abstract:

In this paper, we propose a method for dynamic resource management of a Honeypot-system based on a graph of potential attacks to enable the deployment of a virtual network infrastructure of any scale, according to which a virtual network infrastructure in conditions of limited computing resources changes its configuration, adapting to the actions of an attacker