Creating Cyber Deception Games

被引:2
|
作者
Major, Maxine [1 ]
Fugate, Sunny [1 ]
Mauger, Justin [1 ]
Walter, Kimberly Ferguson [2 ]
机构
[1] Naval Informat Warfare Ctr NIWC Pacif, San Diego, CA USA
[2] Lab Adv Cybersecur Res, Fort George G Meade, MD USA
关键词
game theory; cyber deception; game tree;
D O I
10.1109/CogMI48466.2019.00023
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber deception has typically been a tool used by attackers to mask reconnaissance activities and infiltrate networks while keeping hidden from watchful defenders. We believe the use of deception is a necessary component of network and system defense. This paper uses game theory to reason about a cyber-attack scenario in which a deceiving defender uses lightweight decoys to hide and defend real hosts. In our model, a defender and an attacker play out a game with resources consisting of both real and decoy systems, a set of pre-determined actions for each player, and a method for defining and evaluating individual player strategies and payoffs. Our research provides a general framework for representing deception games using multiple game trees and an explicit representation of each individual player's knowledge of game structure and payoffs. We present a graphical representation of our multiple game tree model and a framework for representing and evaluating the strategy selection when an attacker is unaware of a subset of the defender's available strategies. Finally, we present several cyber deception scenarios using our framework.
引用
收藏
页码:102 / 111
页数:10
相关论文
共 50 条
  • [1] Cyber Camouflage Games for Strategic Deception
    Thakoor, Omkar
    Tambe, Milind
    Vayanos, Phebe
    Xu, Haifeng
    Kiekintveld, Christopher
    Fang, Fei
    DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 525 - 541
  • [2] Epistemic Signaling Games for Cyber Deception With Asymmetric Recognition
    Sasahara, Hampei
    Sandberg, Henrik
    IEEE CONTROL SYSTEMS LETTERS, 2022, 6 : 854 - 859
  • [3] Optimal Honeypot Allocation using Core Attack Graph in Cyber Deception Games
    Nguemkam, Achile Leonel
    Anwar, Ahmed H.
    Tchendji, Vianney Kengne
    Tosh, Deepak K.
    Kamhoua, Charles
    2023 IEEE 34TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PIMRC, 2023,
  • [4] GAMES OF DECEPTION
    REIMOLD, C
    COMMUNICATING TO THE WORLD: INTERNATIONAL PROFESSIONAL COMMUNICATION CONFERENCE, 1989, : 96 - 101
  • [5] DECEPTION GAMES
    BASTON, VJ
    BOSTOCK, FA
    INTERNATIONAL JOURNAL OF GAME THEORY, 1988, 17 (02) : 129 - 134
  • [6] General-Sum Cyber Deception Games under Partial Attacker Valuation Information
    Thakoor, Omkar
    Tambe, Milind
    Vayanos, Phebe
    Xu, Haifeng
    Kiekintveld, Christopher
    AAMAS '19: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS AND MULTIAGENT SYSTEMS, 2019, : 2215 - 2217
  • [7] Two-Layer Deception Model Based on Signaling Games Against Cyber Attacks on Cyber-Physical Systems
    Kamdem, Priva Chassem
    Zemkoho, Alain B.
    Njilla, Laurent
    Nkenlifack, Marcellin
    Kamhoua, Charles A.
    IEEE ACCESS, 2024, 12 : 171559 - 171570
  • [8] Cyber Threats and Cyber Deception in Hybrid Warfare
    Steingartner, William
    Galinec, Darko
    ACTA POLYTECHNICA HUNGARICA, 2021, 18 (03) : 25 - 45
  • [9] Lying and Deception in Games
    Sobel, Joel
    JOURNAL OF POLITICAL ECONOMY, 2020, 128 (03) : 907 - 947
  • [10] A Probabilistic Logic of Cyber Deception
    Jajodia, Sushil
    Park, Noseong
    Pierazzi, Fabio
    Pugliese, Andrea
    Serra, Edoardo
    Simari, Gerardo I.
    Subrahmanian, V. S.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (11) : 2532 - 2544