TY - GEN
T1 - A game theoretic model for enabling honeypots in IoT networks
AU - La, Quang Duy
AU - Quek, Tony Q.S.
AU - Lee, Jemin
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/7/12
Y1 - 2016/7/12
N2 - Honeypots have been considered as one of the methods to ensure security for networks in the Internet of Things (IoT) realm. In this paper, we study the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results showed that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attackers success rate low.
AB - Honeypots have been considered as one of the methods to ensure security for networks in the Internet of Things (IoT) realm. In this paper, we study the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results showed that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attackers success rate low.
UR - http://www.scopus.com/inward/record.url?scp=84981294870&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84981294870&partnerID=8YFLogxK
U2 - 10.1109/ICC.2016.7510833
DO - 10.1109/ICC.2016.7510833
M3 - Conference contribution
AN - SCOPUS:84981294870
T3 - 2016 IEEE International Conference on Communications, ICC 2016
BT - 2016 IEEE International Conference on Communications, ICC 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2016 IEEE International Conference on Communications, ICC 2016
Y2 - 22 May 2016 through 27 May 2016
ER -