Creating Cyber Deception Games

被引:2
|
作者
Major, Maxine [1 ]
Fugate, Sunny [1 ]
Mauger, Justin [1 ]
Walter, Kimberly Ferguson [2 ]
机构
[1] Naval Informat Warfare Ctr NIWC Pacif, San Diego, CA USA
[2] Lab Adv Cybersecur Res, Fort George G Meade, MD USA
关键词
game theory; cyber deception; game tree;
D O I
10.1109/CogMI48466.2019.00023
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber deception has typically been a tool used by attackers to mask reconnaissance activities and infiltrate networks while keeping hidden from watchful defenders. We believe the use of deception is a necessary component of network and system defense. This paper uses game theory to reason about a cyber-attack scenario in which a deceiving defender uses lightweight decoys to hide and defend real hosts. In our model, a defender and an attacker play out a game with resources consisting of both real and decoy systems, a set of pre-determined actions for each player, and a method for defining and evaluating individual player strategies and payoffs. Our research provides a general framework for representing deception games using multiple game trees and an explicit representation of each individual player's knowledge of game structure and payoffs. We present a graphical representation of our multiple game tree model and a framework for representing and evaluating the strategy selection when an attacker is unaware of a subset of the defender's available strategies. Finally, we present several cyber deception scenarios using our framework.
引用
收藏
页码:102 / 111
页数:10
相关论文
共 50 条
  • [31] Deception in Sender-Receiver Games
    Martinez, Manolo
    ERKENNTNIS, 2015, 80 (01) : 215 - 227
  • [32] Zero-Sum Games of Deception
    Braynov, Sviatoslav
    PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 28 - 34
  • [33] Imitative Follower Deception in Stackelberg Games
    Gan, Jiarui
    Xu, Haifeng
    Guo, Qingyu
    Tran-Thanh, Long
    Rabinovich, Zinovi
    Wooldridge, Michael
    ACM EC '19: PROCEEDINGS OF THE 2019 ACM CONFERENCE ON ECONOMICS AND COMPUTATION, 2019, : 639 - 657
  • [34] Creating humans for games
    Coco, D
    COMPUTER GRAPHICS WORLD, 1997, 20 (10) : 26 - &
  • [35] Creating a science of games
    Zyda, Michael
    COMMUNICATIONS OF THE ACM, 2007, 50 (07) : 26 - 29
  • [36] Deception in Finitely Repeated Security Games
    Nguyen, Thanh H.
    Wang, Yongzhao
    Sinha, Arunesh
    Wellman, Michael P.
    THIRTY-THIRD AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2019, : 2133 - 2140
  • [37] CYBER DECEPTION METRICS FOR INTERCONNECTED COMPLEX SYSTEMS
    Al Amin, Md Ali Reza
    Shetty, Sachin
    Kamhoua, Charles
    2022 WINTER SIMULATION CONFERENCE (WSC), 2022, : 473 - 483
  • [38] Deep Learning for Cyber Deception in Wireless Networks
    Olowononi, Felix O.
    Anwar, Ahmed H.
    Rawat, Danda B.
    Acosta, Jaime C.
    Kamhoua, Charles A.
    Proceedings - 2021 17th International Conference on Mobility, Sensing and Networking, MSN 2021, 2021, : 551 - 558
  • [39] Creating Randomness with Games
    Henno, Jaak
    Jaakkola, Hannu
    Makela, Jukka
    2019 IEEE 23RD INTERNATIONAL CONFERENCE ON INTELLIGENT ENGINEERING SYSTEMS (INES 2019), 2019, : 331 - 337
  • [40] Creating Randomness with Games
    Henno, Jaak
    Jaakkola, Hannu
    Makela, Jukka
    ACTA POLYTECHNICA HUNGARICA, 2019, 16 (09) : 193 - 212