A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense

被引:0
|
作者
Clark, Andrew [1 ]
Sun, Kun [2 ]
Bushnell, Linda [3 ]
Poovendran, Radha [3 ]
机构
[1] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
[2] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23187 USA
[3] Univ Washington, Dept Elect Engn, Network Secur Lab, Seattle, WA 98195 USA
来源
DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2015 | 2015年 / 9406卷
基金
美国国家科学基金会;
关键词
D O I
10.1007/978-3-319-25594-1_1
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Networks of decoy nodes protect cyber systems by distracting and misleading adversaries. Decoy defenses can be further enhanced by randomizing the space of node IP addresses, thus preventing an adversary from identifying and blacklisting decoy nodes over time. The decoy-based defense results in a time-varying interaction between the adversary, who attempts to identify and target real nodes, and the system, which deploys decoys and randomizes the address space in order to protect the identity of the real node. In this paper, we present a game-theoretic framework for modeling the strategic interaction between an external adversary and a network of decoy nodes. Our framework consists of two components. First, we model and study the interaction between the adversary and a single decoy node. We analyze the case where the adversary attempts to identify decoy nodes by examining the timing of node responses, as well as the case where the adversary identifies decoys via differences in protocol implementations between decoy and real nodes. Second, we formulate games with an adversary who attempts to find a real node in a network consisting of real and decoy nodes, where the time to detect whether a node is real or a decoy is derived from the equilibria of the games in first component. We derive the optimal policy of the system to randomize the IP address space in order to avoid detection of the real node, and prove that there is a unique threshold-based Stackelberg equilibrium for the game. Through simulation study, we find that the game between a single decoy and an adversary mounting timing-based attacks has a purestrategy Nash equilibrium, while identification of decoy nodes via protocol implementation admits only mixed-strategy equilibria.
引用
收藏
页码:3 / 21
页数:19
相关论文
共 50 条
  • [21] A game-theoretic approach to model and quantify the security of cyber-physical systems
    Orojloo, Hamed
    Azgomi, Mohammad Abdollahi
    COMPUTERS IN INDUSTRY, 2017, 88 : 44 - 57
  • [22] Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense
    Mani, Ganapathy
    Haliem, Marina
    Bhargava, Bharat
    Manickam, Indu
    Kochpatcharin, Kevin
    Kim, Myeongsu
    Vugrin, Eric
    Wang, Weichao
    Jenkins, Chris
    Angin, Pelin
    Yu, Meng
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4853 - 4867
  • [23] Towards ensuring Trustworthiness in Cyber-Physical Systems: A Game-theoretic Approach
    Jithish, J.
    Sankaran, Sriram
    Achuthan, Krishnashree
    2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [24] The game-theoretic model and experimental investigation of cyber wargaming
    Colbert, Edward J. M.
    Kott, Alexander
    Knachel, Lawrence P.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2020, 17 (01): : 21 - 38
  • [25] Game-Theoretic Decision Support for Cyber Forensic Investigations
    Nisioti, Antonia
    Loukas, George
    Rass, Stefan
    Panaousis, Emmanouil
    SENSORS, 2021, 21 (16)
  • [26] Optimization of Investment Planning Based on Game-Theoretic Approach
    Butsenko, E. V.
    EKONOMIKA REGIONA-ECONOMY OF REGION, 2018, 14 (01): : 270 - 280
  • [27] Moving Target Defense Strategy in Critical Embedded Systems: A Game-theoretic Approach
    Ayrault, Maxime
    Borde, Etienne
    Kuhne, Ulrich
    Leneutre, Jean
    2021 IEEE 26TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2021), 2021, : 27 - 36
  • [28] A Game-theoretic Approach to Optimal Defense Strategy against Load Redistribution Attack
    Xiang, Yingmeng
    Wang, Lingfeng
    2015 IEEE POWER & ENERGY SOCIETY GENERAL MEETING, 2015,
  • [29] Analyzing Defense Strategies Against Mobile Information Leakages: A Game-Theoretic Approach
    Kumari, Kavita
    Jadliwala, Murtuza
    Maiti, Anindya
    Manshaei, Mohammad Hossein
    DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 276 - 296
  • [30] A Markov Signaling Game-Theoretic Approach to Moving Target Defense Strategy Selection
    Jiang L.
    Zhang H.-W.
    Wang J.-D.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (03): : 527 - 535