Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid

被引:21
|
作者
Tian, Wen [1 ]
Ji, Xiaopeng [2 ]
Liu, Weiwei [1 ]
Liu, Guangjie [2 ]
Zhai, Jiangtao [2 ]
Dai, Yuewei [2 ]
Huang, Shuhua [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Automat, Nanjing 210094, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Elect & Informat Engn, Nanjing 210044, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷 / 08期
基金
中国国家自然科学基金;
关键词
Honeypot; game theory; power grid; APT; prospect theory; GAME; ATTACKS; VULNERABILITY; MANAGEMENT; SYSTEMS; CHOICE; MODEL;
D O I
10.1109/ACCESS.2020.2984795
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As one of the most critical infrastructure, the power grid has been increasingly threatened by network attacks, especially advanced persistent threats (APTs). APT in the power grid is a continual and stealthy attack that analyzes the interaction between the cyber layer and the physical layer. The existing offensive and defensive processes for power grid using honeypots against APTs are modeled based on full rationality. Therefore, both the attacker and the defender make decisions to maximize their payoffs under full rationality. However, fully rational decisions made by end-users are not always conformed with the real cases, and prospect theory is a typical boundedly rational method to model these deviations. In this study, we propose a subjective APT-honeypot game model to study the offensive and defensive interactions between the attacker and the defender based on the prospect theory. In this model, we protect the power grid bus nodes by deploying honeypots, which consider both low- and high-interaction honeypot modes. We prove the existence of Bayesian-Nash equilibrium strategies in defense and attack strategies under bounded rationality. In addition, we used IEEE-30 Bus system to verify the proposed model in this paper. Experiment results show that bounded rationality affects strategy selection and reduces attacker & x2019;s payoffs.
引用
收藏
页码:64075 / 64085
页数:11
相关论文
共 50 条
  • [1] Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study
    Xiao, Liang
    Xu, Dongjin
    Xie, Caixia
    Mandayam, Narayan B.
    Poor, H. Vincent
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (03) : 534 - 544
  • [2] Prospect Theoretic Study of Cloud Storage Defense Against Advanced Persistent Threats
    Xu, Dongjin
    Li, Yanda
    Xiao, Liang
    Mandayam, Narayan B.
    Poor, H. Vincent
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [3] Cumulative Prospect Theoretic Study of A Cloud Storage Defense Game Against Advanced Persistent Threats
    Xu, Dongjin
    Xiao, Liang
    Mandayam, Narayan B.
    Poor, H. Vincent
    2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 541 - 546
  • [4] Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game
    Tian, Wen
    Du, Miao
    Ji, Xiaopeng
    Liu, Guangjie
    Dai, Yuewei
    Han, Zhu
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (24): : 17372 - 17381
  • [5] Advanced Persistent Threats - Detection and Defense
    Vukalovic, J.
    Delija, D.
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1324 - 1330
  • [6] GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats
    Rass, Stefan
    Zhu, Quanyan
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 314 - 326
  • [7] Moving Target Defense against Advanced Persistent Threats for Cybersecurity Enhancement
    Khosravi-Farmad, Masoud
    Ramaki, Ali Ahmadian
    Bafghi, Abbas Ghaemi
    2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2018, : 280 - 285
  • [8] Defense Against Advanced Persistent Threats with Expert System for Internet of Things
    Hu, Qing
    Lv, Shichao
    Shi, Zhiqiang
    Sun, Limin
    Xiao, Liang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 326 - 337
  • [9] Defense Against Advanced Persistent Threats: A Colonel Blotto Game Approach
    Min, Minghui
    Xiao, Liang
    Xie, Caixia
    Hajimirsadeghi, Mohammad
    Mandayam, Narayan B.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [10] Multi-layered Defense against Advanced Persistent Threats (APT)
    Torii, Satoru
    Morinaga, Masanobu
    Yoshioka, Takashi
    Terada, Takeaki
    Unno, Yuki
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2014, 50 (01): : 52 - 59