Bayesian Game Based Pseudo Honeypot Model in Social Networks

被引:4
作者
Du, Miao [1 ]
Li, Yongzhong [1 ]
Lu, Qing [2 ]
Wang, Kun [2 ]
机构
[1] Jiangsu Univ Sci & Technol, Zhenjiang 212003, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Nanjing 210003, Jiangsu, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT II | 2017年 / 10603卷
关键词
Social networks; Distributed denial of service; Bayesian game; Pseudo honeypot; Optimal active detection; Network security; ATTACKS; DDOS;
D O I
10.1007/978-3-319-68542-7_6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study applying honeypots to protect social networks against DDoS attacks. Different from previous works that study honeypots for DDoS attacks, we consider attackers are rational and know to optimize attacking strategies based on the defender's strategy. To deal with such strategic attackers, we propose a novel pseudo honeypot game model following the Bayesian game setting. In addition, we rigorously prove the existence of Bayesian Nash equilibriums (BNEs) and show how to find them in all different cases. Simulations show the BNEs achieved in the games not only reduce energy consumption but also improve efficiency of the defense.
引用
收藏
页码:62 / 71
页数:10
相关论文
共 20 条
[1]  
[Anonymous], 2011, STATE SOCIAL MEDIA 2
[2]  
[Anonymous], 2003, P NETW DISTR SYST SE
[3]  
Beham M., 2016, P IEEE IFIP INT C DE, P1
[4]   NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems [J].
Chung, Chun-Jen ;
Khatkar, Pankaj ;
Xing, Tianyi ;
Lee, Jeongkeun ;
Huang, Dijiang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) :198-211
[5]   Density peaks clustering using geodesic distances [J].
Du, Mingjing ;
Ding, Shifei ;
Xu, Xiao ;
Xue, Yu .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2018, 9 (08) :1335-1349
[6]   Energy Big Data: A Survey [J].
Jiang, Hui ;
Wang, Kun ;
Wang, Yihui ;
Gao, Min ;
Zhang, Yan .
IEEE ACCESS, 2016, 4 :3844-3861
[7]   On a Mathematical Model for Low-Rate Shrew DDoS [J].
Luo, Jingtang ;
Yang, Xiaolong ;
Wang, Jin ;
Xu, Jie ;
Sun, Jian ;
Long, Keping .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (07) :1069-1083
[8]   Survey of network-based defense mechanisms countering the DoS and DDoS problems [J].
Peng, Tao ;
Leckie, Christopher ;
Ramamohanarao, Kotagiri .
ACM COMPUTING SURVEYS, 2007, 39 (01)
[9]   SIP Flooding Attack Detection with a Multi-Dimensional Sketch Design [J].
Tang, Jin ;
Cheng, Yu ;
Hao, Yong ;
Song, Wei .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (06) :582-595
[10]   Strategic Honeypot Game Model for Distributed Denial of Service Attacks in the Smart Grid [J].
Wang, Kun ;
Du, Miao ;
Maharjan, Sabita ;
Sun, Yanfei .
IEEE TRANSACTIONS ON SMART GRID, 2017, 8 (05) :2474-2482