A game theoretic investigation of deception in network security

被引:71
作者
Carroll, Thomas E. [2 ]
Grosu, Daniel [1 ]
机构
[1] Wayne State Univ, Dept Comp Sci, Detroit, MI 48202 USA
[2] Pacific NW Natl Lab, Richland, WA 99352 USA
关键词
deception; game theory; honeypots;
D O I
10.1002/sec.242
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, we determine which strategies admit perfect Bayesian equilibria. These equilibria are refined Nash equilibria in which neither the defender nor the attacker will unilaterally choose to deviate from their strategies. We discuss the benefits of employing deceptive equilibrium strategies in the defense of a computer network. Copyright (C) 2010 John Wiley & Sons, Ltd.
引用
收藏
页码:1162 / 1172
页数:11
相关论文
共 27 条
  • [1] A game theoretic analysis of intrusion detection in access control systems
    Alpcan, T
    Basar, T
    [J]. 2004 43RD IEEE CONFERENCE ON DECISION AND CONTROL (CDC), VOLS 1-5, 2004, : 1568 - 1573
  • [2] Alpcan T, 2003, 42ND IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-6, PROCEEDINGS, P2595
  • [3] [Anonymous], ACM T INFORM SYSTEM
  • [4] BOWYER BJ, 1991, CHEATING DECEPTION
  • [5] Browne R, 2000, IEEE MILIT COMMUN C, P417, DOI 10.1109/MILCOM.2000.904987
  • [6] CARROLL TE, 2009, P 18 IEEE INT C COMP
  • [7] A note on the role of deception in information protection
    Cohen, F
    [J]. COMPUTERS & SECURITY, 1998, 17 (06) : 483 - 506
  • [8] Misleading attackers with deception
    Cohen, F
    Koike, D
    [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 30 - 37
  • [9] On recognizing virtual honeypots and countermeasures
    Fu, Xinwen
    Yu, Wei
    Cheng, Dan
    Tan, Xuejun
    Streff, Kevin
    Graham, Steve
    [J]. DASC 2006: 2ND IEEE INTERNATIONAL SYMPOSIUM ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2006, : 211 - 218
  • [10] Deception in honeynets: A game-theoretic analysis
    Garg, Nandan
    Grosu, Daniel
    [J]. 2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 107 - +