Honeypot Game Theory against DoS Attack in UAV Cyber

被引:0
|
作者
Miao, Shangting [1 ]
Li, Yang [2 ]
Pan, Quan [2 ]
机构
[1] Northwestern Polytech Univ, Sch Cybersecur, Xian 710129, Peoples R China
[2] Northwestern Polytech Univ, Sch Automat, Xian 710129, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2023年 / 76卷 / 03期
关键词
UAV cyber security; honeypot game-theoretical model; DoS attack; INTRUSION DETECTION; NETWORKS; SECURITY; SERVICE;
D O I
10.32604/cmc.2023.037257
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A space called Unmanned Aerial Vehicle (UAV) cyber is a new environment where UAV, Ground Control Station (GCS) and business processes are integrated. Denial of service (DoS) attack is a standard network attack method, especially suitable for attacking the UAV cyber. It is a robust security risk for UAV cyber and has recently become an active research area. Game theory is typically used to simulate the existing offensive and defensive mechanisms for DoS attacks in a traditional network. In addition, the honeypot, an effective security vulnerability defense mechanism, has not been widely adopted or modeled for defense against DoS attack UAV cyber. With this motivation, the current research paper presents a honeypot game theory model that considers GCS and DoS attacks, which is used to study the interaction between attack and defense to optimize defense strategies. The GCS and honeypot act as defenses against DoS attacks in this model, and both players select their appropriate methods and build their benefit function models. On this basis, a hierarchical honeypot and G2A network delay reward strategy are introduced so that the defender and the attacker can adjust their respective strategies dynamically. Finally, by adjusting the degree of camouflage of the honeypot for UAV network services, the overall revenue of the defender can be effectively improved. The proposed method proves the existence of a mixed strategy Nash equilibrium and compares it with the existing research on no delay rewards and no honeypot defense scheme. In addition, this method realizes that the UAV cyber still guarantees a network delay of about ten milliseconds in the presence of a DoS attack. The results demonstrate that our methodology is superior to that of previous studies.
引用
收藏
页码:2745 / 2762
页数:18
相关论文
共 50 条
  • [1] Using game theory to model DoS attack and defence
    Bhupender Kumar
    Bubu Bhuyan
    Sādhanā, 2019, 44
  • [2] Using game theory to model DoS attack and defence
    Kumar, Bhupender
    Bhuyan, Bubu
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (12):
  • [3] Study on prevention of DoS attack using honeypot technique
    Zhang, Deng-Yin
    Luo, Tao
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (02): : 40 - 43
  • [4] A game theoretic defence framework against DoS/DDoS cyber attacks
    Spyridopoulos, T.
    Karanikas, G.
    Tryfonas, T.
    Oikonomou, G.
    COMPUTERS & SECURITY, 2013, 38 : 39 - 50
  • [5] Honeypot Based Industrial Threat Detection Using Game Theory in Cyber-Physical System
    Zhou, Xiangming
    Almutairi, Laila
    Alsenani, Theyab R.
    Ahmad, Mohammad Nazir
    JOURNAL OF GRID COMPUTING, 2023, 21 (04)
  • [6] Honeypot Based Industrial Threat Detection Using Game Theory in Cyber-Physical System
    Xiangming Zhou
    Laila Almutairi
    Theyab R. Alsenani
    Mohammad Nazir Ahmad
    Journal of Grid Computing, 2023, 21
  • [7] Game Theory based Modified Naive-bayes Algorithm to detect DoS attacks using Honeypot
    Shrivastava, Rajesh Kumar
    Ramakrishna, Saradhi
    Hota, Chittaranjan
    2019 IEEE 16TH INDIA COUNCIL INTERNATIONAL CONFERENCE (IEEE INDICON 2019), 2019,
  • [8] Security State Estimation for Cyber-Physical Systems against DoS Attacks via Reinforcement Learning and Game Theory
    Jin, Zengwang
    Zhang, Shuting
    Hu, Yanyan
    Zhang, Yanning
    Sun, Changyin
    ACTUATORS, 2022, 11 (07)
  • [9] Honeypot-Based Cyber Deception Against Malicious Reconnaissance via Hypergame Theory
    Anwar, Ahmed H.
    Zhu, Mu
    Wan, Zeilin
    Cho, Jin-Hee
    Kamhoua, Charles A.
    Singh, Munindar P.
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 3393 - 3398
  • [10] A Compensation Control Scheme against DoS Attack for Nonlinear Cyber-Physical Systems
    Zhang, Meng
    Shen, Chao
    Han, Sicong
    PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 144 - 149