A game-theoretic framework for dynamic cyber deception in Internet of Battlefield Things

被引:17
作者
Anwar, Ahmed H. [1 ]
Kamhoua, Charles [1 ]
Leslie, Nandi [1 ]
机构
[1] US Army Res Lab, Adelphi, MD 20783 USA
来源
PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19) | 2019年
关键词
network security; game theory; cyber deception; IoBT;
D O I
10.1145/3360774.3368204
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber deception techniques are crucial to protect networks in battlefield settings and combat malicious cyber attacks. Cyber deception can effectively disrupt the surveillance process outcome of an adversary. In this paper, we propose a novel approach for cyber deception to protect important nodes and trap the adversary. We present a sequential approach of honeypot placement to defend and protect the network vital nodes. We formulate a stochastic game to study the dynamic interactions between the network administrator and the attacker. The defender makes strategic decisions about where to place honeypots to introduce new vulnerabilities to the network. The attacker's goal is to develop an attack strategy to compromise the nodes of the network by exploiting a set of known vulnerabilities. To consider a practical threat model, we assume that the attacker can only observe a noisy version of the network state. To this end, both players solve a partially observable stochastic game (POSG). Finally, we present a discussion on existing techniques to solve the formulated game and possible approaches to reduce the game complexity as part of our ongoing and future research.
引用
收藏
页码:522 / 526
页数:5
相关论文
共 50 条
[31]   Community detection in networks: a game-theoretic framework [J].
Yan Chen ;
Xuanyu Cao ;
K. J. Ray Liu .
EURASIP Journal on Advances in Signal Processing, 2019
[32]   Self-Adaptive Framework with Game Theoretic Decision Making for Internet of Things [J].
Lee, Euijong ;
Kim, Young-Gab ;
Seo, Young-Duk ;
Baik, Doo-Kwon .
PROCEEDINGS OF TENCON 2018 - 2018 IEEE REGION 10 CONFERENCE, 2018, :2092-2097
[33]   Cyber-Physical Systems With Multiple Denial-of-Service Attackers: A Game-Theoretic Framework [J].
Huang, Yabing ;
Zhao, Jun .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2021, 68 (10) :4349-4359
[34]   Dynamic Proportional Sharing: A Game-Theoretic Approach [J].
Freeman, Rupert ;
Zahedi, Seyed Majid ;
Conitzer, Vincent ;
Lee, Benjamin C. .
PROCEEDINGS OF THE ACM ON MEASUREMENT AND ANALYSIS OF COMPUTING SYSTEMS, 2018, 2 (01)
[35]   Deception Maze: A Stackelberg Game-Theoretic Defense Mechanism for Intranet Threats [J].
Liu, Jieling ;
Wang, Zhiliang ;
Yang, Jiahai ;
Wang, Bo ;
He, Lin ;
Song, Guanglei ;
Liu, Xinran .
IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
[36]   A game-theoretic framework for the security system of visible watermarking [J].
Tsai, Min-Jen ;
Liu, Jung ;
Wang, Chen-Sheng .
EXPERT SYSTEMS WITH APPLICATIONS, 2011, 38 (05) :5748-5754
[37]   A Game-Theoretic Framework for Interpretable Preference and Feature Learning [J].
Polato, Mirko ;
Aiolli, Fabio .
ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING - ICANN 2018, PT I, 2018, 11139 :659-668
[38]   A Survey of Cyber-Physical Systems From a Game-Theoretic Perspective [J].
Tushar, Wayes ;
Yuen, Chau ;
Saha, Tapan K. K. ;
Nizami, Sohrab ;
Alam, Mollah Rezaul ;
Smith, David B. B. ;
Poor, H. Vincent .
IEEE ACCESS, 2023, 11 :9799-9834
[39]   Jamming Attack on Cyber-Physical Systems: A Game-theoretic Approach [J].
Li, Yuzhe ;
Shi, Ling ;
Cheng, Peng ;
Chen, Jiming ;
Quevedo, Daniel E. .
2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER), 2013, :252-+
[40]   A game theoretic defence framework against DoS/DDoS cyber attacks [J].
Spyridopoulos, T. ;
Karanikas, G. ;
Tryfonas, T. ;
Oikonomou, G. .
COMPUTERS & SECURITY, 2013, 38 :39-50