Creating Cyber Deception Games

被引:2
|
作者
Major, Maxine [1 ]
Fugate, Sunny [1 ]
Mauger, Justin [1 ]
Walter, Kimberly Ferguson [2 ]
机构
[1] Naval Informat Warfare Ctr NIWC Pacif, San Diego, CA USA
[2] Lab Adv Cybersecur Res, Fort George G Meade, MD USA
关键词
game theory; cyber deception; game tree;
D O I
10.1109/CogMI48466.2019.00023
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber deception has typically been a tool used by attackers to mask reconnaissance activities and infiltrate networks while keeping hidden from watchful defenders. We believe the use of deception is a necessary component of network and system defense. This paper uses game theory to reason about a cyber-attack scenario in which a deceiving defender uses lightweight decoys to hide and defend real hosts. In our model, a defender and an attacker play out a game with resources consisting of both real and decoy systems, a set of pre-determined actions for each player, and a method for defining and evaluating individual player strategies and payoffs. Our research provides a general framework for representing deception games using multiple game trees and an explicit representation of each individual player's knowledge of game structure and payoffs. We present a graphical representation of our multiple game tree model and a framework for representing and evaluating the strategy selection when an attacker is unaware of a subset of the defender's available strategies. Finally, we present several cyber deception scenarios using our framework.
引用
收藏
页码:102 / 111
页数:10
相关论文
共 50 条
  • [21] Deception Planning Models for Cyber Security
    De Faveri, Cristiano
    Moreira, Ana
    Souza, Eric
    PROCEEDINGS OF THE 2017 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2017), 2017,
  • [22] Cyber Deception via System Manipulation
    Jones, James
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 194 - 201
  • [23] Deception for Cyber Defence: Challenges and Opportunities
    Liebowitz, David
    Nepal, Surya
    Moore, Kristen
    Christopher, Cody J.
    Kanhere, Salil S.
    Nguyen, David
    Timmer, Roelien C.
    Longland, Michael
    Rathakumar, Keerth
    2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021), 2021, : 173 - 182
  • [24] Cyber Deception: Overview and the Road Ahead
    Wang, Cliff
    Lu, Zhuo
    IEEE SECURITY & PRIVACY, 2018, 16 (02) : 80 - 85
  • [25] Hypothesis Testing Game for Cyber Deception
    Zhang, Tao
    Zhu, Quanyan
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 540 - 555
  • [26] ACyDS: An Adaptive Cyber Deception System
    Chiang, Cho-Yu J.
    Gottlieb, Yitzchak M.
    Sugrim, Shridatt James
    Chadha, Ritu
    Serban, Constantin
    Poylisher, Alex
    Marvel, Lisa M.
    Santos, Jonathan
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 800 - 805
  • [27] Active Deception Framework: An Extensible Development Environment for Adaptive Cyber Deception
    Islam, Md Mazharul
    Al-Shaer, Ehab
    2020 IEEE SECURE DEVELOPMENT (SECDEV 2020), 2020, : 41 - 48
  • [28] Active cyber defense with denial and deception: A cyber-wargame experiment
    Heckman, Kristin E.
    Walsh, Michael J.
    Stech, Frank J.
    O'Boyle, Todd. A.
    DiCato, Stephen R.
    Herber, Audra F.
    COMPUTERS & SECURITY, 2013, 37 : 72 - 77
  • [29] Mirage: cyber deception against autonomous cyber attacks in emulation and simulation
    Kouremetis, Michael
    Lawrence, Dean
    Alford, Ron
    Cheuvront, Zoe
    Davila, David
    Geyer, Benjamin
    Haigh, Trevor
    Michalak, Ethan
    Murphy, Rachel
    Russo, Gianpaolo
    ANNALS OF TELECOMMUNICATIONS, 2024, 79 (11-12) : 803 - 817
  • [30] Cyber expert feedback: Experiences, expectations, and opinions about cyber deception
    Ferguson-Walter, Kimberly J.
    Major, Maxine M.
    Johnson, Chelsea K.
    Johnson, Craig J.
    Scott, Dakota D.
    Gutzwiller, Robert S.
    Shade, Temmie
    COMPUTERS & SECURITY, 2023, 130