A game-theoretic framework for dynamic cyber deception in Internet of Battlefield Things

被引:9
|
作者
Anwar, Ahmed H. [1 ]
Kamhoua, Charles [1 ]
Leslie, Nandi [1 ]
机构
[1] US Army Res Lab, Adelphi, MD 20783 USA
关键词
network security; game theory; cyber deception; IoBT;
D O I
10.1145/3360774.3368204
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber deception techniques are crucial to protect networks in battlefield settings and combat malicious cyber attacks. Cyber deception can effectively disrupt the surveillance process outcome of an adversary. In this paper, we propose a novel approach for cyber deception to protect important nodes and trap the adversary. We present a sequential approach of honeypot placement to defend and protect the network vital nodes. We formulate a stochastic game to study the dynamic interactions between the network administrator and the attacker. The defender makes strategic decisions about where to place honeypots to introduce new vulnerabilities to the network. The attacker's goal is to develop an attack strategy to compromise the nodes of the network by exploiting a set of known vulnerabilities. To consider a practical threat model, we assume that the attacker can only observe a noisy version of the network state. To this end, both players solve a partially observable stochastic game (POSG). Finally, we present a discussion on existing techniques to solve the formulated game and possible approaches to reduce the game complexity as part of our ongoing and future research.
引用
收藏
页码:522 / 526
页数:5
相关论文
共 50 条
  • [31] A Non-cooperative Game-Theoretic Framework for Sponsoring Content in the Internet Market
    Garmani, Hamid
    Omar, Driss Ait
    El Amrani, Mohamed
    Baslam, Mohamed
    Jourhmane, Mostafa
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2020, 16 (04) : 316 - 323
  • [32] Dynamic Psychological Game Theory for Secure Internet of Battlefield Things (IoBT) Systems
    Hu, Ye
    Sanjab, Anibal
    Saad, Walid
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 3712 - 3726
  • [33] The game-theoretic model and experimental investigation of cyber wargaming
    Colbert, Edward J. M.
    Kott, Alexander
    Knachel, Lawrence P.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2020, 17 (01): : 21 - 38
  • [34] Game-Theoretic Decision Support for Cyber Forensic Investigations
    Nisioti, Antonia
    Loukas, George
    Rass, Stefan
    Panaousis, Emmanouil
    SENSORS, 2021, 21 (16)
  • [35] A game-theoretic model for resource allocation with deception and defense efforts
    Zhang, Xiaoxiong
    Hipel, Keith W.
    Ge, Bingfeng
    Tan, Yuejin
    SYSTEMS ENGINEERING, 2019, 22 (03) : 282 - 291
  • [36] A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy
    Pawlick, Jeffrey
    Colbert, Edward
    Zhu, Quanyan
    ACM COMPUTING SURVEYS, 2019, 52 (04)
  • [37] A game-theoretic approach for power systems defense against dynamic cyber-attacks
    Hasan, Saqib
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2020, 115
  • [38] Towards a Game-Theoretic Framework for Information Retrieval
    Zhai, ChengXiang
    SIGIR 2015: PROCEEDINGS OF THE 38TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL, 2015, : 543 - 543
  • [39] Knowledge Sharing Framework: a Game-Theoretic Approach
    Al-Gharaibeh, Rami S.
    Ali, Mostafa Z.
    JOURNAL OF THE KNOWLEDGE ECONOMY, 2022, 13 (01) : 332 - 366
  • [40] A Game-Theoretic Framework for Resource Sharing in Clouds
    Zafari, Faheem
    Leung, Kin K.
    Towsley, Don
    Basu, Prithwish
    Swami, Ananthram
    PROCEEDINGS OF THE 2019 12TH IFIP WIRELESS AND MOBILE NETWORKING CONFERENCE (WMNC 2019), 2019, : 8 - 15