Influence of Network Size on Adversarial Decisions in a Deception Game Involving Honeypots

被引:3
|
作者
Katakwar, Harsh [1 ]
Aggarwal, Palvi [2 ]
Maqbool, Zahid [1 ]
Dutt, Varun [1 ]
机构
[1] Indian Inst Technol Mandi, Appl Cognit Sci Lab, Kamand, India
[2] Carnegie Mellon Univ, Dynam Decis Making Lab, Pittsburgh, PA 15213 USA
来源
FRONTIERS IN PSYCHOLOGY | 2020年 / 11卷
关键词
honeypot; cybersecurity; cyber deception; deception game; adversary; defender; probes; attacks;
D O I
10.3389/fpsyg.2020.535803
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Deception via honeypots, computers that pretend to be real, may provide effective ways of countering cyberattacks in computer networks. Although prior research has investigated the effectiveness of timing and amount of deception via deception-based games, it is unclear as to how the size of the network (i.e., the number of computer systems in the network) influences adversarial decisions. In this research, using a deception game (DG), we evaluate the influence of network size on adversary's cyberattack decisions. The DG has two sequential stages, probe and attack, and it is defined as DG (n,k, gamma), where n is the number of servers, k is the number of honeypots, and gamma is the number of probes that the adversary makes before attacking the network. In the probe stage, participants may probe a few web servers or may not probe the network. In the attack stage, participants may attack any one of the web servers or decide not to attack the network. In a laboratory experiment, participants were randomly assigned to a repeated DG across three different between-subject conditions: small (20 participants), medium (20 participants), and large (20 participants). The small, medium, and large conditions used DG (2, 1, 1), DG (6, 3, 3), and DG (12, 6, 6) games, respectively (thus, the proportion of honeypots was kept constant at 50% in all three conditions). Results revealed that in the small network, the proportions of honeypot and no-attack actions were 0.20 and 0.52, whereas in the medium (large) network, the proportions of honeypot and no-attack actions were 0.50 (0.50) and 0.06 (0.03), respectively. There was also an effect of probing actions on attack actions across all three network sizes. We highlight the implications of our results for networks of different sizes involving deception via honeypots.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] The Art of False Alarms in the Game of Deception: Leveraging Fake Honeypots for Enhanced Security
    Zarras, Apostolis
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,
  • [2] Deception in A Multi-agent Adversarial Game: The Game of Guarding Several Territories
    Asgharnia, Amirhossein
    Schwartz, Howard M.
    Atia, Mohamed
    2020 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2020, : 1321 - 1327
  • [3] A Game-Theoretic Approach for Network Security Using Honeypots
    Florea, Razvan
    Craus, Mitica
    FUTURE INTERNET, 2022, 14 (12):
  • [4] Adversarial Deception Against SAR Target Recognition Network
    Zhang, Fan
    Meng, Tianying
    Xiang, Deliang
    Ma, Fei
    Sun, Xiaokun
    Zhou, Yongsheng
    IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2022, 15 : 4507 - 4520
  • [5] A game theoretic investigation of deception in network security
    Carroll, Thomas E.
    Grosu, Daniel
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (10) : 1162 - 1172
  • [6] Adversarial decisions on complex dynamical systems using game theory
    Cullen, Andrew C.
    Alpcan, Tansu
    Kalloniatis, Alexander C.
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 594
  • [7] Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense
    Wang, Chen
    Zeng, Chengyi
    Liu, Hongfu
    Chen, Jing
    ELECTRONICS, 2021, 10 (21)
  • [8] A Two-Stage Deception Game for Network Defense
    Wang, Wei
    Zeng, Bo
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 569 - 582
  • [9] Game-Theoretic Method for Optimal Initial Allocation of Honeypots for Enhanced Network Security
    Asefi-Ghamari, Hamidreza
    Hassani, Murtadha
    Mahgoub, Imad
    2024 INTERNATIONAL CONFERENCE ON SMART APPLICATIONS, COMMUNICATIONS AND NETWORKING, SMARTNETS-2024, 2024,
  • [10] Cyber Deception for Wireless Network Virtualization using Stackelberg Game Theory
    Adebayo, Abdulhamid A.
    Rawat, Danda B.
    2021 IEEE 18TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2021,