Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things

In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-attacks, as virtually any devices with a wireless connection could be vulne...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet of things journal 2016-12, Vol.3 (6), p.1025-1035
Hauptverfasser: Quang Duy La, Quek, Tony Q. S., Jemin Lee, Shi Jin, Hongbo Zhu
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1035
container_issue 6
container_start_page 1025
container_title IEEE internet of things journal
container_volume 3
creator Quang Duy La
Quek, Tony Q. S.
Jemin Lee
Shi Jin
Hongbo Zhu
description In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-attacks, as virtually any devices with a wireless connection could be vulnerable to malicious hacking attempts. Meanwhile, honeypot-based deception mechanism has been considered as one of the methods to ensure security for modern networks in the Internet of Things (IoT). In this paper, we address the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results show that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low.
doi_str_mv 10.1109/JIOT.2016.2547994
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JIOT_2016_2547994</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7442780</ieee_id><sourcerecordid>1858790843</sourcerecordid><originalsourceid>FETCH-LOGICAL-c341t-1fcaa3fb9e60b57704f7a1601243869566390c847c32d5b683eb3222dc49923c3</originalsourceid><addsrcrecordid>eNpNkE1PAjEQQBujiQT5AcZLE8-L_dp2eySAgDFywYOnTbc7K8tHd22Lhn_vEojxNHN4byZ5CN1TMqSU6KeXxXI1ZITKIUuF0lpcoR7jTCVCSnb9b79FgxA2hJBOS6mWPfQxAQttrL8Bj2I0douNK_EEKnAB8MzsAdcOzxsHx7aJydSZYgclfoP40_htwFXjcVwDXrgI3kHETYVX69p9hjt0U5ldgMFl9tH783Q1nievy9liPHpNLBc0JrSyxvCq0CBJkSpFRKUMlYQywTOpUym5JjYTynJWpoXMOBScMVZaoTXjlvfR4_lu65uvA4SYb5qDd93LnGZppjTJBO8oeqasb0LwUOWtr_fGH3NK8lPE_BQxP0XMLxE75-Hs1ADwxyshmMoI_wUgEWu0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1858790843</pqid></control><display><type>article</type><title>Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things</title><source>IEEE</source><creator>Quang Duy La ; Quek, Tony Q. S. ; Jemin Lee ; Shi Jin ; Hongbo Zhu</creator><creatorcontrib>Quang Duy La ; Quek, Tony Q. S. ; Jemin Lee ; Shi Jin ; Hongbo Zhu</creatorcontrib><description>In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-attacks, as virtually any devices with a wireless connection could be vulnerable to malicious hacking attempts. Meanwhile, honeypot-based deception mechanism has been considered as one of the methods to ensure security for modern networks in the Internet of Things (IoT). In this paper, we address the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results show that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low.</description><identifier>ISSN: 2327-4662</identifier><identifier>EISSN: 2327-4662</identifier><identifier>DOI: 10.1109/JIOT.2016.2547994</identifier><identifier>CODEN: IITJAU</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Attacks and defenses ; Bayes methods ; Cybersecurity ; Deception ; Game theory ; honeypots ; Internet of Things ; Internet of Things (IoT) ; Intrusion detection ; Mathematical model ; network security ; Networks ; Wireless access points</subject><ispartof>IEEE internet of things journal, 2016-12, Vol.3 (6), p.1025-1035</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c341t-1fcaa3fb9e60b57704f7a1601243869566390c847c32d5b683eb3222dc49923c3</citedby><cites>FETCH-LOGICAL-c341t-1fcaa3fb9e60b57704f7a1601243869566390c847c32d5b683eb3222dc49923c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7442780$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7442780$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Quang Duy La</creatorcontrib><creatorcontrib>Quek, Tony Q. S.</creatorcontrib><creatorcontrib>Jemin Lee</creatorcontrib><creatorcontrib>Shi Jin</creatorcontrib><creatorcontrib>Hongbo Zhu</creatorcontrib><title>Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things</title><title>IEEE internet of things journal</title><addtitle>JIoT</addtitle><description>In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-attacks, as virtually any devices with a wireless connection could be vulnerable to malicious hacking attempts. Meanwhile, honeypot-based deception mechanism has been considered as one of the methods to ensure security for modern networks in the Internet of Things (IoT). In this paper, we address the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results show that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low.</description><subject>Attacks and defenses</subject><subject>Bayes methods</subject><subject>Cybersecurity</subject><subject>Deception</subject><subject>Game theory</subject><subject>honeypots</subject><subject>Internet of Things</subject><subject>Internet of Things (IoT)</subject><subject>Intrusion detection</subject><subject>Mathematical model</subject><subject>network security</subject><subject>Networks</subject><subject>Wireless access points</subject><issn>2327-4662</issn><issn>2327-4662</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkE1PAjEQQBujiQT5AcZLE8-L_dp2eySAgDFywYOnTbc7K8tHd22Lhn_vEojxNHN4byZ5CN1TMqSU6KeXxXI1ZITKIUuF0lpcoR7jTCVCSnb9b79FgxA2hJBOS6mWPfQxAQttrL8Bj2I0douNK_EEKnAB8MzsAdcOzxsHx7aJydSZYgclfoP40_htwFXjcVwDXrgI3kHETYVX69p9hjt0U5ldgMFl9tH783Q1nievy9liPHpNLBc0JrSyxvCq0CBJkSpFRKUMlYQywTOpUym5JjYTynJWpoXMOBScMVZaoTXjlvfR4_lu65uvA4SYb5qDd93LnGZppjTJBO8oeqasb0LwUOWtr_fGH3NK8lPE_BQxP0XMLxE75-Hs1ADwxyshmMoI_wUgEWu0</recordid><startdate>20161201</startdate><enddate>20161201</enddate><creator>Quang Duy La</creator><creator>Quek, Tony Q. S.</creator><creator>Jemin Lee</creator><creator>Shi Jin</creator><creator>Hongbo Zhu</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20161201</creationdate><title>Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things</title><author>Quang Duy La ; Quek, Tony Q. S. ; Jemin Lee ; Shi Jin ; Hongbo Zhu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c341t-1fcaa3fb9e60b57704f7a1601243869566390c847c32d5b683eb3222dc49923c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Attacks and defenses</topic><topic>Bayes methods</topic><topic>Cybersecurity</topic><topic>Deception</topic><topic>Game theory</topic><topic>honeypots</topic><topic>Internet of Things</topic><topic>Internet of Things (IoT)</topic><topic>Intrusion detection</topic><topic>Mathematical model</topic><topic>network security</topic><topic>Networks</topic><topic>Wireless access points</topic><toplevel>online_resources</toplevel><creatorcontrib>Quang Duy La</creatorcontrib><creatorcontrib>Quek, Tony Q. S.</creatorcontrib><creatorcontrib>Jemin Lee</creatorcontrib><creatorcontrib>Shi Jin</creatorcontrib><creatorcontrib>Hongbo Zhu</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE internet of things journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Quang Duy La</au><au>Quek, Tony Q. S.</au><au>Jemin Lee</au><au>Shi Jin</au><au>Hongbo Zhu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things</atitle><jtitle>IEEE internet of things journal</jtitle><stitle>JIoT</stitle><date>2016-12-01</date><risdate>2016</risdate><volume>3</volume><issue>6</issue><spage>1025</spage><epage>1035</epage><pages>1025-1035</pages><issn>2327-4662</issn><eissn>2327-4662</eissn><coden>IITJAU</coden><abstract>In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-attacks, as virtually any devices with a wireless connection could be vulnerable to malicious hacking attempts. Meanwhile, honeypot-based deception mechanism has been considered as one of the methods to ensure security for modern networks in the Internet of Things (IoT). In this paper, we address the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results show that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JIOT.2016.2547994</doi><tpages>11</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2327-4662
ispartof IEEE internet of things journal, 2016-12, Vol.3 (6), p.1025-1035
issn 2327-4662
2327-4662
language eng
recordid cdi_crossref_primary_10_1109_JIOT_2016_2547994
source IEEE
subjects Attacks and defenses
Bayes methods
Cybersecurity
Deception
Game theory
honeypots
Internet of Things
Internet of Things (IoT)
Intrusion detection
Mathematical model
network security
Networks
Wireless access points
title Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T23%3A57%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Deceptive%20Attack%20and%20Defense%20Game%20in%20Honeypot-Enabled%20Networks%20for%20the%20Internet%20of%20Things&rft.jtitle=IEEE%20internet%20of%20things%20journal&rft.au=Quang%20Duy%20La&rft.date=2016-12-01&rft.volume=3&rft.issue=6&rft.spage=1025&rft.epage=1035&rft.pages=1025-1035&rft.issn=2327-4662&rft.eissn=2327-4662&rft.coden=IITJAU&rft_id=info:doi/10.1109/JIOT.2016.2547994&rft_dat=%3Cproquest_RIE%3E1858790843%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1858790843&rft_id=info:pmid/&rft_ieee_id=7442780&rfr_iscdi=true