A game-theoretic framework for dynamic cyber deception in Internet of Battlefield Things

被引:9
|
作者
Anwar, Ahmed H. [1 ]
Kamhoua, Charles [1 ]
Leslie, Nandi [1 ]
机构
[1] US Army Res Lab, Adelphi, MD 20783 USA
关键词
network security; game theory; cyber deception; IoBT;
D O I
10.1145/3360774.3368204
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber deception techniques are crucial to protect networks in battlefield settings and combat malicious cyber attacks. Cyber deception can effectively disrupt the surveillance process outcome of an adversary. In this paper, we propose a novel approach for cyber deception to protect important nodes and trap the adversary. We present a sequential approach of honeypot placement to defend and protect the network vital nodes. We formulate a stochastic game to study the dynamic interactions between the network administrator and the attacker. The defender makes strategic decisions about where to place honeypots to introduce new vulnerabilities to the network. The attacker's goal is to develop an attack strategy to compromise the nodes of the network by exploiting a set of known vulnerabilities. To consider a practical threat model, we assume that the attacker can only observe a noisy version of the network state. To this end, both players solve a partially observable stochastic game (POSG). Finally, we present a discussion on existing techniques to solve the formulated game and possible approaches to reduce the game complexity as part of our ongoing and future research.
引用
收藏
页码:522 / 526
页数:5
相关论文
共 50 条
  • [21] Game-Theoretic and Probabilistic Cyber Risk Assessment
    Zhao, Yunfei
    2024 ANNUAL RELIABILITY AND MAINTAINABILITY SYMPOSIUM, RAMS, 2024,
  • [22] Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach
    Abu Sayed, Md
    Anwar, Ahmed H.
    Kiekintveld, Christopher
    Kamhoua, Charles
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2023, 2023, 14167 : 195 - 214
  • [23] An extension of duality to a game-theoretic framework
    Pavel, Lacra
    AUTOMATICA, 2007, 43 (02) : 226 - 237
  • [24] Behavioral Cyber Deception: A Game and Prospect Theoretic Approach
    Nan, Satyaki
    Brahma, Swastik
    Kamhoua, Charles A.
    Leslie, Nandi O.
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [25] A Game-Theoretic Framework for Interference Avoidance
    Menon, R.
    MacKenzie, A. B.
    Hicks, J.
    Buehrer, R. M.
    Reed, J. H.
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2009, 57 (04) : 1087 - 1098
  • [26] Market Analysis of Distributed Learning Resource Management for Internet of Things: A Game-Theoretic Approach
    Lee, Joohyung
    Kim, DaeJin
    Niyato, Dusit
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (09) : 8430 - 8439
  • [27] Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment
    Jie, Yingmo
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Liu, Charles Zhechao
    Li, Mingchu
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 3041 - 3052
  • [28] Investigating LoRa for the Internet of Battlefield Things: A Cyber Perspective
    Sondrol, Torkjel
    Jalaian, Brian
    Suri, Niranjan
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 742 - 749
  • [29] A Game-Theoretic Approach for Increasing Resource Utilization in Edge Computing Enabled Internet of Things
    Kumar, Sumit
    Gupta, Ruchir
    Lakshmanan, K.
    Maurya, Vipin
    IEEE ACCESS, 2022, 10 : 57974 - 57989
  • [30] A Game-theoretic Framework for Dynamic Spectrum Leasing (DSL) in Cognitive Radios
    Jayaweera, Sudharman K.
    Hakim, Kamrul
    Mosquera, Carlos
    2009 IEEE GLOBECOM WORKSHOPS, 2009, : 57 - +