Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things

Quang Duy La, Tony Q.S. Quek, Jemin Lee, Shi Jin, Hongbo Zhu

研究成果: Article同行評審

92 引文 斯高帕斯(Scopus)

摘要

In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-Attacks, as virtually any devices with a wireless connection could be vulnerable to malicious hacking attempts. Meanwhile, honeypot-based deception mechanism has been considered as one of the methods to ensure security for modern networks in the Internet of Things (IoT). In this paper, we address the problem of defending against attacks in honeypot-enabled networks by looking at a game-Theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results show that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low.

原文English
文章編號7442780
頁(從 - 到)1025-1035
頁數11
期刊IEEE Internet of Things Journal
3
發行號6
DOIs
出版狀態Published - 2016 12月

All Science Journal Classification (ASJC) codes

  • 訊號處理
  • 資訊系統
  • 硬體和架構
  • 電腦科學應用
  • 電腦網路與通信

指紋

深入研究「Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things」主題。共同形成了獨特的指紋。

引用此