Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems

被引:2
|
作者
Anwar, Ahmed H. [1 ]
Leslie, Nandi O. [2 ]
Kamhoua, Charles A. [1 ]
机构
[1] US Army, Res Lab, Adelphi, MD 20756 USA
[2] Raytheon Technol, Waltham, MA USA
关键词
D O I
10.1109/MILCOM52596.2021.9652927
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber deception plays an important role in both proactive and reactive defense systems. Internet of Battlefield things connecting smart devices of any military tactical network is of great importance. The goal of cyber deception is to provide false information regarding the network state, and topology to protect the IoBT's network devices. In this paper, we propose a novel deceptive approach based on game theory that takes into account the topological aspects of the network and the criticality of each device. To find the optimal deceptive strategy, we formulate a two-player game to study the interactions between the network defender and the adversary. The Nash equilibrium of the game model is characterized. Moreover, we propose a scalable game-solving algorithm to overcome the curse of dimensionality. This approach is based on solving a smaller in-size subgame per node. Our numerical results show that the proposed deception approach effectively reduced the impact and the reward of the attacker
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [1] Game theoretic modeling of cyber deception in the Internet of Battlefield Things
    Kamhoua, Charles A.
    2018 56TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2018, : 862 - 862
  • [2] Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
    Park, Jeman
    Mohaisen, Aziz
    Kamhoua, Charles A.
    Weisman, Michael J.
    Leslie, Nandi O.
    Njilla, Laurent
    INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 299 - 312
  • [3] Honeypot Allocation for Cyber Deception Under Uncertainty
    Anwar, Ahmed H.
    Kamhoua, Charles A.
    Leslie, Nandi O.
    Kiekintveld, Christopher
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 3438 - 3452
  • [4] A game-theoretic framework for dynamic cyber deception in Internet of Battlefield Things
    Anwar, Ahmed H.
    Kamhoua, Charles
    Leslie, Nandi
    PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19), 2019, : 522 - 526
  • [5] Investigating LoRa for the Internet of Battlefield Things: A Cyber Perspective
    Sondrol, Torkjel
    Jalaian, Brian
    Suri, Niranjan
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 742 - 749
  • [6] Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach
    Abu Sayed, Md
    Anwar, Ahmed H.
    Kiekintveld, Christopher
    Kamhoua, Charles
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2023, 2023, 14167 : 195 - 214
  • [7] Optimal Honeypot Allocation using Core Attack Graph in Cyber Deception Games
    Nguemkam, Achile Leonel
    Anwar, Ahmed H.
    Tchendji, Vianney Kengne
    Tosh, Deepak K.
    Kamhoua, Charles
    2023 IEEE 34TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PIMRC, 2023,
  • [8] Lightweight On-Demand Honeypot Deployment for Cyber Deception
    Acosta, Jaime C.
    Basak, Anjon
    Kiekintveld, Christopher
    Kamhoua, Charles
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2021, 2022, 441 : 294 - 312
  • [9] Backbones for Internet of Battlefield Things
    Papakostas, Dimitrios
    Kasidakis, Theodoros
    Fragkou, Evangelia
    Katsaros, Dimitrios
    2021 16TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES CONFERENCE (WONS), 2021, : 116 - 123
  • [10] Internet of Things and Cyber-Physical Systems
    Grobelna, Iwona
    FUTURE INTERNET, 2022, 14 (11):