A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense

被引:0
|
作者
Clark, Andrew [1 ]
Sun, Kun [2 ]
Bushnell, Linda [3 ]
Poovendran, Radha [3 ]
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
[2] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23187 USA
[3] Univ Washington, Dept Elect Engn, Network Secur Lab, Seattle, WA 98195 USA
来源
DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015 | 2015年 / 9406卷
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-319-25594-1_1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Networks of decoy nodes protect cyber systems by distracting and misleading adversaries. Decoy defenses can be further enhanced by randomizing the space of node IP addresses, thus preventing an adversary from identifying and blacklisting decoy nodes over time. The decoy-based defense results in a time-varying interaction between the adversary, who attempts to identify and target real nodes, and the system, which deploys decoys and randomizes the address space in order to protect the identity of the real node. In this paper, we present a game-theoretic framework for modeling the strategic interaction between an external adversary and a network of decoy nodes. Our framework consists of two components. First, we model and study the interaction between the adversary and a single decoy node. We analyze the case where the adversary attempts to identify decoy nodes by examining the timing of node responses, as well as the case where the adversary identifies decoys via differences in protocol implementations between decoy and real nodes. Second, we formulate games with an adversary who attempts to find a real node in a network consisting of real and decoy nodes, where the time to detect whether a node is real or a decoy is derived from the equilibria of the games in first component. We derive the optimal policy of the system to randomize the IP address space in order to avoid detection of the real node, and prove that there is a unique threshold-based Stackelberg equilibrium for the game. Through simulation study, we find that the game between a single decoy and an adversary mounting timing-based attacks has a purestrategy Nash equilibrium, while identification of decoy nodes via protocol implementation admits only mixed-strategy equilibria.
引用
收藏
页码:3 / 21
页数:19
相关论文
共 50 条
  • [1] Effectiveness of IP Address Randomization in Decoy-Based Moving Target Defense
    Clark, Andrew
    Sun, Kun
    Poovendran, Radha
    2013 IEEE 52ND ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2013, : 678 - 685
  • [2] Game-Theoretic Threat Screening and Deceptive Techniques for Cyber Defense
    Schlenker, Aaron
    THIRTY-SECOND AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTIETH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / EIGHTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2018, : 8034 - 8035
  • [3] A game-theoretic approach for power systems defense against dynamic cyber-attacks
    Hasan, Saqib
    Dubey, Abhishek
    Karsai, Gabor
    Koutsoukos, Xenofon
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2020, 115
  • [4] Effects of Interdependencies on Game-Theoretic Defense of Cyber-Physical Infrastructures
    He, Fei
    Chandrasekar, Santhosh
    Rao, Nageswara S., V
    Ma, Chris Y. T.
    2019 22ND INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION 2019), 2019,
  • [5] Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
    Rao, Nageswara S. V.
    Poole, Stephen W.
    Ma, Chris Y. T.
    He, Fei
    Zhuang, Jun
    Yau, David K. Y.
    RISK ANALYSIS, 2016, 36 (04) : 694 - 710
  • [6] Discrete game-theoretic analysis of defense in correlated cyber-physical systems
    He, Fei
    Zhuang, Jun
    Rao, Nageswara S. V.
    ANNALS OF OPERATIONS RESEARCH, 2020, 294 (1-2) : 741 - 767
  • [7] Discrete game-theoretic analysis of defense in correlated cyber-physical systems
    Fei He
    Jun Zhuang
    Nageswara S. V. Rao
    Annals of Operations Research, 2020, 294 : 741 - 767
  • [8] Decoy-based Moving Target defense Against Cyber-physical Attacks On Smart Grid
    Abdelwahab, Ahmed
    Lucia, Walter
    Youssef, Amr
    2020 IEEE ELECTRIC POWER AND ENERGY CONFERENCE (EPEC), 2020,
  • [9] Examining the Efficacy of Decoy-based and Psychological Cyber Deception
    Ferguson-Walter, Kimberly J.
    Major, Maxine M.
    Johnson, Chelsea K.
    Muhleman, Daniel H.
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 1127 - 1144
  • [10] A Game Theoretic Approach to Model Cyber Attack and Defense Strategies
    Attiah, Afraa
    Chatterjee, Mainak
    Zou, Cliff C.
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,