A game theoretic investigation of deception in network security

被引:71
|
作者
Carroll, Thomas E. [2 ]
Grosu, Daniel [1 ]
机构
[1] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[2] Pacific NW Natl Lab, Richland, WA 99352 USA
关键词
deception; game theory; honeypots;
D O I
10.1002/sec.242
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, we determine which strategies admit perfect Bayesian equilibria. These equilibria are refined Nash equilibria in which neither the defender nor the attacker will unilaterally choose to deviate from their strategies. We discuss the benefits of employing deceptive equilibrium strategies in the defense of a computer network. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:1162 / 1172
页数:11
相关论文
共 50 条
  • [1] On Game-Theoretic Network Security Provisioning
    Stefan Rass
    Journal of Network and Systems Management, 2013, 21 : 47 - 64
  • [2] A graph-theoretic network security game
    Mavronicolas, M
    Papadopoulou, V
    Philippou, A
    Spirakis, P
    INTERNET AND NETWORK ECONOMICS, PROCEEDINGS, 2005, 3828 : 969 - 978
  • [3] On Game-Theoretic Network Security Provisioning
    Rass, Stefan
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2013, 21 (01) : 47 - 64
  • [4] A graph-theoretic network security game
    Department of Computer Science, University of Cyprus, Nicosia CY-1678, Cyprus
    不详
    不详
    Int. J. Auton. Adapt. Commun. Syst., 2008, 4 (390-410):
  • [5] Deception in honeynets: A game-theoretic analysis
    Garg, Nandan
    Grosu, Daniel
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 107 - +
  • [6] Game-Theoretic Approach Towards Network Security A Review
    Tom, Litti
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [7] A Game-Theoretic Approach for Network Security Using Honeypots
    Florea, Razvan
    Craus, Mitica
    FUTURE INTERNET, 2022, 14 (12):
  • [8] A Game Theoretic Framework for Multi Domain Cyber Deception
    Hemida, Ahmed
    Asghar, Ahmed Bilal
    Kamhoua, Charles
    Kleinberg, Jon
    9TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW 2024, 2024, : 443 - 447
  • [9] Behavioral Cyber Deception: A Game and Prospect Theoretic Approach
    Nan, Satyaki
    Brahma, Swastik
    Kamhoua, Charles A.
    Leslie, Nandi O.
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [10] Game Theoretic Analysis of Security and Sustainability
    An, Bo
    PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 5111 - 5115