Cyber Deception under Strategic and Irrationality Considerations

被引:0
|
作者
Nan, Satyaki [1 ]
Brahma, Swastik [2 ]
机构
[1] Georgia Southwestern State Univ, Dept Comp, Americus, GA 31709 USA
[2] Univ Cincinnati, Dept Comp Sci, Cincinnati, OH USA
关键词
Cyber deception; Game theory; Prospect theory; Security;
D O I
10.1109/PIMRC56721.2023.10293910
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper presents a novel cyber deception technique that can employ fake nodes to deceive attackers. To devise such a technique, the paper uses game theory to model strategic interactions between a defender and an attacker, and prospect theory to model their possible cognitive biases, while diligently accounting for cost factors associated with attack-defense strategies. Nash Equilibrium (NE)-based strategies for deploying our devised deception tactics when the defender and the attacker are fully rational in nature as well as when they may exhibit behavioral irrationalities have been analytically characterized in the paper. Among others, our results delineate how vulnerabilities of conventional defense resources can influence adoption of deception-based defenses. Numerous simulation results have been presented that provide important insights into our developed deception-based defense strategies.
引用
收藏
页数:6
相关论文
共 50 条
  • [11] A Probabilistic Logic of Cyber Deception
    Jajodia, Sushil
    Park, Noseong
    Pierazzi, Fabio
    Pugliese, Andrea
    Serra, Edoardo
    Simari, Gerardo I.
    Subrahmanian, V. S.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2532 - 2544
  • [12] Strategic denial and deception
    Godson R.
    Wirtz J.J.
    Trends in Organized Crime, 2000, 6 (1) : 5 - 16
  • [13] Visual Modeling of Cyber Deception
    De Faveri, Cristiano
    Moreira, Ana
    2018 IEEE SYMPOSIUM ON VISUAL LANGUAGES AND HUMAN-CENTRIC COMPUTING (VL/HCC), 2018, : 205 - 209
  • [14] Denial and Deception in Cyber Defense
    Heckman, Kristin E.
    Stech, Frank J.
    Schmoker, Ben S.
    Thomas, Roshan K.
    COMPUTER, 2015, 48 (04) : 36 - 44
  • [15] Technologies to Enable Cyber Deception
    Urias, Vincent E.
    Stout, William M. S.
    Luc-Watson, Jean
    Grim, Cole
    Liebrock, Lorie
    Merza, Monzy
    2017 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2017,
  • [16] Software Diversity for Cyber Deception
    Sarr, Aliou Badra
    Anwar, Ahmed H.
    Kamhoua, Charles
    Leslie, Nandi
    Acosta, Jaime
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [17] Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space
    Stech, Frank
    Heckman, Kristin E.
    Hilliard, Phil
    Ballo, Janice R.
    PSYCHNOLOGY JOURNAL, 2011, 9 (02): : 79 - 121
  • [18] Strategic electoral considerations under proportional representation
    Irwin, Galen A.
    Van Holsteyn, Joop J. M.
    ELECTORAL STUDIES, 2012, 31 (01) : 184 - 191
  • [19] Adaptive control of cyber-physical systems under deception and injection attacks
    Yang, Yue
    Huang, Jiangshuai
    Su, Xiaojie
    Deng, Benmin
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2021, 358 (12): : 6174 - 6194
  • [20] Deception Tree Model for Cyber Operation
    Park, Chang-wook
    Kim, Young-gab
    2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 135 - 138