Creating Cyber Deception Games

被引:2
|
作者
Major, Maxine [1 ]
Fugate, Sunny [1 ]
Mauger, Justin [1 ]
Walter, Kimberly Ferguson [2 ]
机构
[1] Naval Informat Warfare Ctr NIWC Pacif, San Diego, CA USA
[2] Lab Adv Cybersecur Res, Fort George G Meade, MD USA
关键词
game theory; cyber deception; game tree;
D O I
10.1109/CogMI48466.2019.00023
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cyber deception has typically been a tool used by attackers to mask reconnaissance activities and infiltrate networks while keeping hidden from watchful defenders. We believe the use of deception is a necessary component of network and system defense. This paper uses game theory to reason about a cyber-attack scenario in which a deceiving defender uses lightweight decoys to hide and defend real hosts. In our model, a defender and an attacker play out a game with resources consisting of both real and decoy systems, a set of pre-determined actions for each player, and a method for defining and evaluating individual player strategies and payoffs. Our research provides a general framework for representing deception games using multiple game trees and an explicit representation of each individual player's knowledge of game structure and payoffs. We present a graphical representation of our multiple game tree model and a framework for representing and evaluating the strategy selection when an attacker is unaware of a subset of the defender's available strategies. Finally, we present several cyber deception scenarios using our framework.
引用
收藏
页码:102 / 111
页数:10
相关论文
共 50 条
  • [41] Foresighted Deception in Dynamic Security Games
    He, Xiaofan
    Islam, Mohammad M.
    Jin, Richeng
    Dai, Huaiyu
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [42] CREATING GAMES WITH FEELING
    Fyans, A. Cavan
    McAllister, Graham
    CGAMES'2006: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER GAMES: ARTIFICIAL INTELLIGENCE AND MOBILE SYSTEMS, 2006, : 94 - 98
  • [43] Deep Learning for Cyber Deception in Wireless Networks
    Olowononi, Felix O.
    Anwar, Ahmed H.
    Rawat, Danda B.
    Acosta, Jaime C.
    Kamhoua, Charles A.
    2021 17TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2021), 2021, : 551 - 558
  • [44] Detecting Deception in Cyber Conflict: A Strategic Approach
    Chen, Jim
    Duvall, Gilliam
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 78 - 85
  • [45] Cyber Deception under Strategic and Irrationality Considerations
    Nan, Satyaki
    Brahma, Swastik
    2023 IEEE 34TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PIMRC, 2023,
  • [46] Legal Aspects of Misattribution Caused by Cyber Deception
    Stejskal, Petr
    Faix, Martin
    2022 14TH INTERNATIONAL CONFERENCE ON CYBER CONFLICT: KEEP MOVING (CYCON), 2022, : 205 - 218
  • [47] SODA: A System for Cyber Deception Orchestration and Automation
    Sajid, Md Sajidul Islam
    Wei, Jinpeng
    Abdeen, Basel
    Al-Shaer, Ehab
    Islam, Md Mazharul
    Diong, Walter
    Khan, Latifur
    37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021, 2021, : 675 - 689
  • [48] Deception used for Cyber Defense of Control Systems
    McQueen, Miles A.
    Boyer, Wayne F.
    HSI: 2009 2ND CONFERENCE ON HUMAN SYSTEM INTERACTIONS, 2009, : 621 - 628
  • [49] Digital Deception: Cyber Fraud and Online Misinformation
    Loukas, George
    Patrikakis, Charalampos Z.
    Wilbanks, Linda R.
    IT PROFESSIONAL, 2020, 22 (02) : 19 - 20
  • [50] Honeypot Allocation for Cyber Deception Under Uncertainty
    Anwar, Ahmed H.
    Kamhoua, Charles A.
    Leslie, Nandi O.
    Kiekintveld, Christopher
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 3438 - 3452