Research on Optimization of Array Honeypot Defense Strategies Based on Evolutionary Game Theory

被引:18
作者
Shi, Leyi [1 ,2 ,3 ]
Wang, Xiran [2 ]
Hou, Huiwen [2 ]
机构
[1] China Univ Petr, Coll Oceanog & Space Informat, Qingdao 266580, Peoples R China
[2] China Univ Petr, Coll Comp Sci & Technol, Qingdao 266580, Peoples R China
[3] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
基金
中国国家自然科学基金;
关键词
evolutionary game theory; array honeypot; multi-party game; bounded rationality; evolutionarily stable strategy; proactive defense; dynamic honeypot; STABLE STRATEGIES;
D O I
10.3390/math9080805
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Honeypot has been regarded as an active defense technology that can deceive attackers by simulating real systems. However, honeypot is actually a static network trap with fixed disposition, which is easily identified by anti-honeypot technology. Thus, honeypot is a "passive" active defense technology. Dynamic honeypot makes up for the shortcomings of honeypot, which dynamically adjusts defense strategies with the attack of hackers. Therefore, the confrontation between defenders and attackers is a strategic game. This paper focuses on the non-cooperative evolutionary game mechanism of bounded rationality, aiming to improve the security of the array honeypot system through the evolutionarily stable strategies derived from the evolutionary game model. First, we construct a three-party evolutionary game model of array honeypot, which is composed of defenders, attackers and legitimate users. Secondly, we formally describe the strategies and revenues of players in the game, and build the three-party game payoff matrices. Then the evolutionarily stable strategy is obtained by analyzing the Replicator Dynamics of various parties. In addition, we discuss the equilibrium condition to get the influence of the number of servers N on the stability of strategy evolution. MATLAB and Gambit simulation experiment results show that deduced evolutionarily stable strategies are valid in resisting attackers.
引用
收藏
页数:21
相关论文
共 45 条
[1]   Honeypot Type Selection Games for Smart Grid Networks [J].
Boumkheld, Nadia ;
Panda, Sakshyam ;
Rass, Stefan ;
Panaousis, Emmanouil .
DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 :85-96
[2]   Modeling, Analysis and Control of Networked Evolutionary Games [J].
Cheng, Daizhan ;
He, Fenghua ;
Qi, Hongsheng ;
Xu, Tingting .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (09) :2402-2415
[3]   Equilibrium analysis of general N-population multi-strategy games for generation-side long-term bidding: An evolutionary game perspective [J].
Cheng, Lefeng ;
Liu, Guiyun ;
Huang, Hanqi ;
Wang, Xiaogang ;
Chen, Yang ;
Zhang, Jie ;
Meng, Anbo ;
Yang, Ru ;
Yu, Tao .
JOURNAL OF CLEANER PRODUCTION, 2020, 276
[4]   Three-player partizan games [J].
Cincotti, A .
THEORETICAL COMPUTER SCIENCE, 2005, 332 (1-3) :367-389
[5]   N-player partizan games [J].
Cincotti, Alessandro .
THEORETICAL COMPUTER SCIENCE, 2010, 411 (34-36) :3224-3234
[6]  
Deng C, 2020, CHIN J MANAG SCI, DOI [10.16381/j.cnki.issn1003-207x.2019.1007, DOI 10.16381/J.CNKI.ISSN1003-207X.2019.1007]
[7]   An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things [J].
Du, Miao ;
Wang, Kun .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (01) :648-657
[8]  
Edwards AWF, 2000, GENETICS, V154, P1419
[9]  
Herbert G., 2015, GAME THEORY EVOLVING
[10]  
Huang JM, 2017, 2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), P2611, DOI 10.1109/IAEAC.2017.8054497