Influence of Network Size on Adversarial Decisions in a Deception Game Involving Honeypots

被引:3
|
作者
Katakwar, Harsh [1 ]
Aggarwal, Palvi [2 ]
Maqbool, Zahid [1 ]
Dutt, Varun [1 ]
机构
[1] Indian Inst Technol Mandi, Appl Cognit Sci Lab, Kamand, India
[2] Carnegie Mellon Univ, Dynam Decis Making Lab, Pittsburgh, PA 15213 USA
来源
FRONTIERS IN PSYCHOLOGY | 2020年 / 11卷
关键词
honeypot; cybersecurity; cyber deception; deception game; adversary; defender; probes; attacks;
D O I
10.3389/fpsyg.2020.535803
中图分类号
B84 [心理学];
学科分类号
04 ; 0402 ;
摘要
Deception via honeypots, computers that pretend to be real, may provide effective ways of countering cyberattacks in computer networks. Although prior research has investigated the effectiveness of timing and amount of deception via deception-based games, it is unclear as to how the size of the network (i.e., the number of computer systems in the network) influences adversarial decisions. In this research, using a deception game (DG), we evaluate the influence of network size on adversary's cyberattack decisions. The DG has two sequential stages, probe and attack, and it is defined as DG (n,k, gamma), where n is the number of servers, k is the number of honeypots, and gamma is the number of probes that the adversary makes before attacking the network. In the probe stage, participants may probe a few web servers or may not probe the network. In the attack stage, participants may attack any one of the web servers or decide not to attack the network. In a laboratory experiment, participants were randomly assigned to a repeated DG across three different between-subject conditions: small (20 participants), medium (20 participants), and large (20 participants). The small, medium, and large conditions used DG (2, 1, 1), DG (6, 3, 3), and DG (12, 6, 6) games, respectively (thus, the proportion of honeypots was kept constant at 50% in all three conditions). Results revealed that in the small network, the proportions of honeypot and no-attack actions were 0.20 and 0.52, whereas in the medium (large) network, the proportions of honeypot and no-attack actions were 0.50 (0.50) and 0.06 (0.03), respectively. There was also an effect of probing actions on attack actions across all three network sizes. We highlight the implications of our results for networks of different sizes involving deception via honeypots.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] How Language makes Decisions (before): By the Influence and Rhetoric of collective Self-Deception
    Antos, Gerd
    INFORMATION-WISSENSCHAFT UND PRAXIS, 2014, 65 (03): : 156 - 162
  • [22] Adversarial explanations for understanding image classification decisions and improved neural network robustness
    Walt Woods
    Jack Chen
    Christof Teuscher
    Nature Machine Intelligence, 2019, 1 : 508 - 516
  • [23] Adversarial explanations for understanding image classification decisions and improved neural network robustness
    Woods, Walt
    Chen, Jack
    Teuscher, Christof
    NATURE MACHINE INTELLIGENCE, 2019, 1 (11) : 508 - 516
  • [24] A Generative Adversarial Network Approach to Predict Nanoparticle Size in Microfluidics
    Mihandoost, Sara
    Rezvantalab, Sima
    Pallares, Roger M.
    Schulz, Volkmar
    Kiessling, Fabian
    ACS BIOMATERIALS SCIENCE & ENGINEERING, 2024,
  • [25] A differential privacy based multi-stage network fingerprinting deception game method
    He, Yuan
    Xing, Changyou
    Ding, Ke
    Zhang, Guomin
    Song, Lihua
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 74
  • [26] Network tournament pedagogical approach involving game playing in artificial intelligence
    Wu, MD
    Liao, YH
    Sun, CT
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2003, 19 (04) : 589 - 603
  • [27] The social influence of investment decisions: A game about the Dutch pork sector
    Ambrosius, Floor H. W.
    Hofstede, Gert Jan
    Bokkers, Eddie A. M.
    Bock, Bettina B.
    Beulens, Adrie J. M.
    LIVESTOCK SCIENCE, 2019, 220 : 111 - 122
  • [28] In-Network Probabilistic Monitoring Primitives under the Influence of Adversarial Network Inputs
    Harish, S. A.
    Kumar, K. Shiv
    Majee, Anibrata
    Bedarakota, Amogh
    Tammana, Praveen
    Kannan, Pravein Govindan
    Shah, Rinku
    PROCEEDINGS OF THE 7TH ASIA-PACIFIC WORKSHOP ON NETWORKING, APNET 2023, 2023, : 116 - 122
  • [29] (Self) Driving Under the Influence: Intoxicating Adversarial Network Inputs
    Meier, Roland
    Holterbach, Thomas
    Keck, Stephan
    Stahli, Matthias
    Lenders, Vincent
    Singla, Ankit
    Vanbever, Laurent
    PROCEEDINGS OF THE EIGHTEENTH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS '19), 2019, : 34 - 42
  • [30] Dealing with Adversarial Player Strategies in the Neural Network Game iNNk through Ensemble Learning
    Lowe, Mathias
    Villareale, Jennifer
    Freed, Evan
    Sladek, Aleksanteri
    Zhu, Jichen
    Risi, Sebastian
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON THE FOUNDATIONS OF DIGITAL GAMES, FDG 2021, 2021,