首页> 外文期刊>Internet of Things Journal, IEEE >Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things
【24h】

Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things

机译:启用了蜜罐的物联网网络中的欺骗性攻击和防御游戏

获取原文
获取原文并翻译 | 示例
       

摘要

In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-attacks, as virtually any devices with a wireless connection could be vulnerable to malicious hacking attempts. Meanwhile, honeypot-based deception mechanism has been considered as one of the methods to ensure security for modern networks in the Internet of Things (IoT). In this paper, we address the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results show that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low.
机译:在当今时代,信息和通信技术的突破导致越来越多的各种类型的设备都可以连接到Internet。由于几乎任何具有无线连接的设备都可能容易受到恶意黑客攻击,因此这也增加了防范网络攻击的必要性。同时,基于蜜罐的欺骗机制已被视为确保物联网(IoT)中现代网络安全的方法之一。在本文中,我们通过研究包含攻击者和防御者的欺骗的博弈论模型来解决防御启用蜜罐的网络中的攻击的问题。攻击者可能尝试通过采用从可疑到看似正常的活动等不同类型的攻击来欺骗防御者,而防御者又可以利用蜜罐作为欺骗手段来诱骗攻击者。该问题被建模为信息不完全的贝叶斯博弈,其中一次博弈和重复博弈版本均被确定为均衡。我们的结果表明,主动攻击者的频率存在一个阈值,在这个阈值上,两个玩家都将采取欺骗性行动,在这个阈值以下,防御者可以混合其策略,同时保持攻击者的成功率较低。

著录项

  • 来源
    《Internet of Things Journal, IEEE》 |2016年第6期|1025-1035|共11页
  • 作者单位

    Temasek Laboratories, Singapore University of Technology and Design, Singapore;

    Information Systems Technology and Design Pillar, Singapore University of Technology and Design (SUTD), Singapore;

    iTrust, Centre for Research in Cyber Security, Singapore University of Technology and Design (SUTD), Singapore;

    National Mobile Communications Research Laboratory, Southeast University, Nanjing, China;

    Jiangsu Key Laboratory of Wireless Communications, Nanjing University of Posts and Telecommunications, Nanjing, China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Internet of things; Bayes methods; Intrusion detection; Game theory; Mathematical model;

    机译:物联网;贝叶斯方法;入侵检测;博弈论;数学模型;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号