Honeypot Based Industrial Threat Detection Using Game Theory in Cyber-Physical System

被引:1
作者
Zhou, Xiangming [1 ]
Almutairi, Laila [2 ]
Alsenani, Theyab R. [3 ]
Ahmad, Mohammad Nazir [4 ]
机构
[1] Jiangxi Teachers Coll, Sch Aeronaut Engn, Yingtan 335000, Peoples R China
[2] Majmaah Univ, Coll Comp & Informat Sci, Dept Comp Engn, Al Majmaah 11952, Saudi Arabia
[3] Prince Sattam Bin Abdulaziz Univ, Coll Engn Al Kharj, Elect Engn Dept, Al Kharj 11942, Saudi Arabia
[4] Univ Kebangsaan Malaysia, Inst Visual Informat, Bangi 43600, Selangor, Malaysia
关键词
Game theory; Cyber-physical system; Industrial security; Honeypots; Stackerlberg game; Reinforcement learning;
D O I
10.1007/s10723-023-09689-4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber threats are clearly understood across the security landscape using honeypot technologies across industrial cyber-physical systems (ICPS). Specifically, Distributed Denial of Service (DDoS) and Man in the Middle (MITM) attacks are the significant malicious threats in ICPS. This paper's anti-honeypot-enabled attack detection system for ICPS is developed using the Stakerlberg dynamic game (SDG) theory and Reinforcement learning (RL) models. The interactions between the ICPS defender and the attackers are captured through BSDG model. RL state and rewards functions exhibit various possible ICPS defenses and offensive attackers. It will capture the attack sequences in the ICPS and identify the attackers efficiently. The simulation and numerical evaluation of two malicious attacks DDoS and MITM, using the proposed strategy, is efficient in detecting malicious activities. This model obtained improved detection rate, time, and accuracy by comparing existing approaches.
引用
收藏
页数:11
相关论文
共 43 条
[1]   A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception [J].
Abolfathi, Masoumeh ;
Shomorony, Ilan ;
Vahid, Alireza ;
Jafarian, Jafar Haadi .
PROCEEDINGS OF THE 27TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2022, 2022, :67-78
[2]   A truthful and budget-balanced double auction model for resource allocation in cloud computing [J].
Alahdadi, Arezou ;
Safaei, Ali Asghar ;
Ebadi, Mohammad Javad .
SOFT COMPUTING, 2023, 27 (23) :18263-18284
[3]   Studying and investigating the impact of marketing mix factors on e-purchase via smart phones (case study: Digikala corporation) [J].
Bozorgkhou, Hamed ;
Alimohammadirokni, Mohammad .
NEXO REVISTA CIENTIFICA, 2022, 35 (04) :992-1003
[4]   A Many-Objective Optimization Model of Industrial Internet of Things Based on Private Blockchain [J].
Cao, Bin ;
Wang, Xuesong ;
Zhang, Weizheng ;
Song, Houbing ;
Lv, Zhihan .
IEEE NETWORK, 2020, 34 (05) :78-83
[5]   Security-Aware Industrial Wireless Sensor Network Deployment Optimization [J].
Cao, Bin ;
Zhao, Jianwei ;
Gu, Yu ;
Fan, Shanshan ;
Yang, Peng .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (08) :5309-5316
[6]   Effectively Detecting Operational Anomalies In Large-Scale IoT Data Infrastructures By Using A GAN-Based Predictive Model [J].
Chen, Peng ;
Liu, Hongyun ;
Xin, Ruyue ;
Carval, Thierry ;
Zhao, Jiale ;
Xia, Yunni ;
Zhao, Zhiming .
COMPUTER JOURNAL, 2022, 65 (11) :2909-2925
[7]   Risk Propagation in Multilayer Heterogeneous Network of Coupled System of Large Engineering Project [J].
Chen, Yun ;
Zhu, Liping ;
Hu, Zhigen ;
Chen, Shu ;
Zheng, Xiazhong .
JOURNAL OF MANAGEMENT IN ENGINEERING, 2022, 38 (03)
[8]   Situation-Aware IoT Service Coordination Using the Event-Driven SOA Paradigm [J].
Cheng, Bo ;
Zhu, Da ;
Zhao, Shuai ;
Chen, Junliang .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2016, 13 (02) :349-361
[9]   Task Co-Offloading for D2D-Assisted Mobile Edge Computing in Industrial Internet of Things [J].
Dai, Xingxia ;
Xiao, Zhu ;
Jiang, Hongbo ;
Alazab, Mamoun ;
Lui, John C. S. ;
Dustdar, Schahram ;
Liu, Jiangchuan .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (01) :480-490
[10]   Reinforcement Learning for the Problem of Detecting Intrusion in a Computer System [J].
Dang, Quang-Vinh ;
Vo, Thanh-Hai .
PROCEEDINGS OF SIXTH INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICICT 2021), VOL 2, 2022, 236 :755-762