A game theoretic investigation of deception in network security

被引:71
|
作者
Carroll, Thomas E. [2 ]
Grosu, Daniel [1 ]
机构
[1] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[2] Pacific NW Natl Lab, Richland, WA 99352 USA
关键词
deception; game theory; honeypots;
D O I
10.1002/sec.242
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, we determine which strategies admit perfect Bayesian equilibria. These equilibria are refined Nash equilibria in which neither the defender nor the attacker will unilaterally choose to deviate from their strategies. We discuss the benefits of employing deceptive equilibrium strategies in the defense of a computer network. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:1162 / 1172
页数:11
相关论文
共 50 条
  • [21] Game theoretic security of quantum bit commitment
    Zhou, Lu
    Sun, Xin
    Su, Chunhua
    Liu, Zhe
    Choo, Kim-Kwang Raymond
    INFORMATION SCIENCES, 2019, 479 : 503 - 514
  • [22] Diversity and System Security: A Game Theoretic Perspective
    Brahma, Swastik
    Kwiat, Kevin
    Varshney, Pramod K.
    Kamhoua, Charles
    2014 IEEE MILITARY COMMUNICATIONS CONFERENCE: AFFORDABLE MISSION SUCCESS: MEETING THE CHALLENGE (MILCOM 2014), 2014, : 146 - 151
  • [23] Decision-theoretic and game-theoretic approaches to IT security investment
    Cavusoglu, Huseyin
    Raghunathan, Srinivasan
    Yue, Wei T.
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2008, 25 (02) : 281 - 304
  • [24] Deception, Identity, and Security: The Game Theory of Sybil Attacks
    Casey, William
    Kellner, Ansgar
    Memarmoshrefi, Parisa
    Morales, Jose Andre
    Mishra, Bud
    COMMUNICATIONS OF THE ACM, 2019, 62 (01) : 85 - 93
  • [25] A game-theoretic model for resource allocation with deception and defense efforts
    Zhang, Xiaoxiong
    Hipel, Keith W.
    Ge, Bingfeng
    Tan, Yuejin
    SYSTEMS ENGINEERING, 2019, 22 (03) : 282 - 291
  • [26] A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
    Pawlick, Jeffrey
    Colbert, Edward
    Zhu, Quanyan
    ACM COMPUTING SURVEYS, 2019, 52 (04)
  • [27] A game theoretic model for the network service
    Zakharov, VV
    Melnikov, VV
    GAME THEORY AND APPLICATIONS, VOL IX, 2003, : 227 - 234
  • [28] A Game Theoretic Approach to Network Coding
    Marden, Jason R.
    Effros, Michelle
    ITW: 2009 IEEE INFORMATION THEORY WORKSHOP ON NETWORKING AND INFORMATION THEORY, 2009, : 147 - 151
  • [29] Game-Theoretic Security Analysis of Quantum Networks
    Rass, Stefan
    Schartner, Peter
    ICQNM 2009: THIRD INTERNATIONAL CONFERENCE ON QUANTUM, NANO AND MICRO TECHNOLOGIES: PROCEEDINGS, 2009, : 20 - 25
  • [30] A Game Theoretic Recommendation System for Security Alert Dissemination
    Alpcan, Tansu
    Liu, Xing
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 51 - +