A game-theoretic framework for dynamic cyber deception in Internet of Battlefield Things

被引:9
|
作者
Anwar, Ahmed H. [1 ]
Kamhoua, Charles [1 ]
Leslie, Nandi [1 ]
机构
[1] US Army Res Lab, Adelphi, MD 20783 USA
关键词
network security; game theory; cyber deception; IoBT;
D O I
10.1145/3360774.3368204
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber deception techniques are crucial to protect networks in battlefield settings and combat malicious cyber attacks. Cyber deception can effectively disrupt the surveillance process outcome of an adversary. In this paper, we propose a novel approach for cyber deception to protect important nodes and trap the adversary. We present a sequential approach of honeypot placement to defend and protect the network vital nodes. We formulate a stochastic game to study the dynamic interactions between the network administrator and the attacker. The defender makes strategic decisions about where to place honeypots to introduce new vulnerabilities to the network. The attacker's goal is to develop an attack strategy to compromise the nodes of the network by exploiting a set of known vulnerabilities. To consider a practical threat model, we assume that the attacker can only observe a noisy version of the network state. To this end, both players solve a partially observable stochastic game (POSG). Finally, we present a discussion on existing techniques to solve the formulated game and possible approaches to reduce the game complexity as part of our ongoing and future research.
引用
收藏
页码:522 / 526
页数:5
相关论文
共 50 条
  • [1] Game theoretic modeling of cyber deception in the Internet of Battlefield Things
    Kamhoua, Charles A.
    [J]. 2018 56TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2018, : 862 - 862
  • [2] Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things
    Tsemogne, Olivier
    Hayel, Yezekael
    Kamhoua, Charles
    Deugoue, Gabriel
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2678 - 2687
  • [3] FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things
    Zhang, Rui
    Zhu, Quanyan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2026 - 2041
  • [4] Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems
    Anwar, Ahmed H.
    Leslie, Nandi O.
    Kamhoua, Charles A.
    [J]. 2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [5] Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
    Park, Jeman
    Mohaisen, Aziz
    Kamhoua, Charles A.
    Weisman, Michael J.
    Leslie, Nandi O.
    Njilla, Laurent
    [J]. INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 299 - 312
  • [6] Jamming in the Internet of Things: A Game-Theoretic Perspective
    Namvar, Nima
    Saad, Walid
    Bahadori, Niloofar
    Kelley, Brian
    [J]. 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [7] On Random Dynamic Voltage Scaling for Internet-of-Things: A Game-Theoretic Approach
    Geng, Hui
    Kwiat, Kevin A.
    Kamhoua, Charles A.
    Shi, Yiyu
    [J]. IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (01) : 123 - 132
  • [8] Dynamic Resource Allocation for Power Distribution Internet of Things: a Game-Theoretic Model
    Li, Zhi
    Liu, Zhu
    Liu, Yanzhu
    Zhang, Nan
    Guo, Jing
    [J]. PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 1396 - 1400
  • [9] Deception in honeynets: A game-theoretic analysis
    Garg, Nandan
    Grosu, Daniel
    [J]. 2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 107 - +
  • [10] Caching in Energy Harvesting Aided Internet of Things: A Game-Theoretic Approach
    Yao, Jingjing
    Ansari, Nirwan
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 3194 - 3201