Research Article
A Novel Attack-and-Defense Signaling Game for Optimal Deceptive Defense Strategy Choice
Table 3
Defense strategy description.
| No. | Basic defense option | Defense strategy | | |
| | Honey file | √ | √ | | Honey account | √ | √ | | Using honeycomb | √ | | | Uninstall delete Trojan | | √ | | Limit access to MDSYS | | √ | | Web app honeypot | √ | |
|
|