Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things
In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-attacks, as virtually any devices with a wireless connection could be vulne...
Gespeichert in:
Veröffentlicht in: | IEEE internet of things journal 2016-12, Vol.3 (6), p.1025-1035 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1035 |
---|---|
container_issue | 6 |
container_start_page | 1025 |
container_title | IEEE internet of things journal |
container_volume | 3 |
creator | Quang Duy La Quek, Tony Q. S. Jemin Lee Shi Jin Hongbo Zhu |
description | In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-attacks, as virtually any devices with a wireless connection could be vulnerable to malicious hacking attempts. Meanwhile, honeypot-based deception mechanism has been considered as one of the methods to ensure security for modern networks in the Internet of Things (IoT). In this paper, we address the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results show that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low. |
doi_str_mv | 10.1109/JIOT.2016.2547994 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_JIOT_2016_2547994</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7442780</ieee_id><sourcerecordid>1858790843</sourcerecordid><originalsourceid>FETCH-LOGICAL-c341t-1fcaa3fb9e60b57704f7a1601243869566390c847c32d5b683eb3222dc49923c3</originalsourceid><addsrcrecordid>eNpNkE1PAjEQQBujiQT5AcZLE8-L_dp2eySAgDFywYOnTbc7K8tHd22Lhn_vEojxNHN4byZ5CN1TMqSU6KeXxXI1ZITKIUuF0lpcoR7jTCVCSnb9b79FgxA2hJBOS6mWPfQxAQttrL8Bj2I0douNK_EEKnAB8MzsAdcOzxsHx7aJydSZYgclfoP40_htwFXjcVwDXrgI3kHETYVX69p9hjt0U5ldgMFl9tH783Q1nievy9liPHpNLBc0JrSyxvCq0CBJkSpFRKUMlYQywTOpUym5JjYTynJWpoXMOBScMVZaoTXjlvfR4_lu65uvA4SYb5qDd93LnGZppjTJBO8oeqasb0LwUOWtr_fGH3NK8lPE_BQxP0XMLxE75-Hs1ADwxyshmMoI_wUgEWu0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1858790843</pqid></control><display><type>article</type><title>Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things</title><source>IEEE</source><creator>Quang Duy La ; Quek, Tony Q. S. ; Jemin Lee ; Shi Jin ; Hongbo Zhu</creator><creatorcontrib>Quang Duy La ; Quek, Tony Q. S. ; Jemin Lee ; Shi Jin ; Hongbo Zhu</creatorcontrib><description>In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-attacks, as virtually any devices with a wireless connection could be vulnerable to malicious hacking attempts. Meanwhile, honeypot-based deception mechanism has been considered as one of the methods to ensure security for modern networks in the Internet of Things (IoT). In this paper, we address the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results show that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low.</description><identifier>ISSN: 2327-4662</identifier><identifier>EISSN: 2327-4662</identifier><identifier>DOI: 10.1109/JIOT.2016.2547994</identifier><identifier>CODEN: IITJAU</identifier><language>eng</language><publisher>Piscataway: IEEE</publisher><subject>Attacks and defenses ; Bayes methods ; Cybersecurity ; Deception ; Game theory ; honeypots ; Internet of Things ; Internet of Things (IoT) ; Intrusion detection ; Mathematical model ; network security ; Networks ; Wireless access points</subject><ispartof>IEEE internet of things journal, 2016-12, Vol.3 (6), p.1025-1035</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2016</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c341t-1fcaa3fb9e60b57704f7a1601243869566390c847c32d5b683eb3222dc49923c3</citedby><cites>FETCH-LOGICAL-c341t-1fcaa3fb9e60b57704f7a1601243869566390c847c32d5b683eb3222dc49923c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7442780$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7442780$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Quang Duy La</creatorcontrib><creatorcontrib>Quek, Tony Q. S.</creatorcontrib><creatorcontrib>Jemin Lee</creatorcontrib><creatorcontrib>Shi Jin</creatorcontrib><creatorcontrib>Hongbo Zhu</creatorcontrib><title>Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things</title><title>IEEE internet of things journal</title><addtitle>JIoT</addtitle><description>In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-attacks, as virtually any devices with a wireless connection could be vulnerable to malicious hacking attempts. Meanwhile, honeypot-based deception mechanism has been considered as one of the methods to ensure security for modern networks in the Internet of Things (IoT). In this paper, we address the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results show that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low.</description><subject>Attacks and defenses</subject><subject>Bayes methods</subject><subject>Cybersecurity</subject><subject>Deception</subject><subject>Game theory</subject><subject>honeypots</subject><subject>Internet of Things</subject><subject>Internet of Things (IoT)</subject><subject>Intrusion detection</subject><subject>Mathematical model</subject><subject>network security</subject><subject>Networks</subject><subject>Wireless access points</subject><issn>2327-4662</issn><issn>2327-4662</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkE1PAjEQQBujiQT5AcZLE8-L_dp2eySAgDFywYOnTbc7K8tHd22Lhn_vEojxNHN4byZ5CN1TMqSU6KeXxXI1ZITKIUuF0lpcoR7jTCVCSnb9b79FgxA2hJBOS6mWPfQxAQttrL8Bj2I0douNK_EEKnAB8MzsAdcOzxsHx7aJydSZYgclfoP40_htwFXjcVwDXrgI3kHETYVX69p9hjt0U5ldgMFl9tH783Q1nievy9liPHpNLBc0JrSyxvCq0CBJkSpFRKUMlYQywTOpUym5JjYTynJWpoXMOBScMVZaoTXjlvfR4_lu65uvA4SYb5qDd93LnGZppjTJBO8oeqasb0LwUOWtr_fGH3NK8lPE_BQxP0XMLxE75-Hs1ADwxyshmMoI_wUgEWu0</recordid><startdate>20161201</startdate><enddate>20161201</enddate><creator>Quang Duy La</creator><creator>Quek, Tony Q. S.</creator><creator>Jemin Lee</creator><creator>Shi Jin</creator><creator>Hongbo Zhu</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20161201</creationdate><title>Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things</title><author>Quang Duy La ; Quek, Tony Q. S. ; Jemin Lee ; Shi Jin ; Hongbo Zhu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c341t-1fcaa3fb9e60b57704f7a1601243869566390c847c32d5b683eb3222dc49923c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Attacks and defenses</topic><topic>Bayes methods</topic><topic>Cybersecurity</topic><topic>Deception</topic><topic>Game theory</topic><topic>honeypots</topic><topic>Internet of Things</topic><topic>Internet of Things (IoT)</topic><topic>Intrusion detection</topic><topic>Mathematical model</topic><topic>network security</topic><topic>Networks</topic><topic>Wireless access points</topic><toplevel>online_resources</toplevel><creatorcontrib>Quang Duy La</creatorcontrib><creatorcontrib>Quek, Tony Q. S.</creatorcontrib><creatorcontrib>Jemin Lee</creatorcontrib><creatorcontrib>Shi Jin</creatorcontrib><creatorcontrib>Hongbo Zhu</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998–Present</collection><collection>IEEE</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEEE internet of things journal</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Quang Duy La</au><au>Quek, Tony Q. S.</au><au>Jemin Lee</au><au>Shi Jin</au><au>Hongbo Zhu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things</atitle><jtitle>IEEE internet of things journal</jtitle><stitle>JIoT</stitle><date>2016-12-01</date><risdate>2016</risdate><volume>3</volume><issue>6</issue><spage>1025</spage><epage>1035</epage><pages>1025-1035</pages><issn>2327-4662</issn><eissn>2327-4662</eissn><coden>IITJAU</coden><abstract>In modern days, breakthroughs in information and communications technologies lead to more and more devices of every imaginable type being connected to the Internet. This also strengthens the need for protection against cyber-attacks, as virtually any devices with a wireless connection could be vulnerable to malicious hacking attempts. Meanwhile, honeypot-based deception mechanism has been considered as one of the methods to ensure security for modern networks in the Internet of Things (IoT). In this paper, we address the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results show that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attacker's success rate low.</abstract><cop>Piscataway</cop><pub>IEEE</pub><doi>10.1109/JIOT.2016.2547994</doi><tpages>11</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2327-4662 |
ispartof | IEEE internet of things journal, 2016-12, Vol.3 (6), p.1025-1035 |
issn | 2327-4662 2327-4662 |
language | eng |
recordid | cdi_crossref_primary_10_1109_JIOT_2016_2547994 |
source | IEEE |
subjects | Attacks and defenses Bayes methods Cybersecurity Deception Game theory honeypots Internet of Things Internet of Things (IoT) Intrusion detection Mathematical model network security Networks Wireless access points |
title | Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T23%3A57%3A23IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Deceptive%20Attack%20and%20Defense%20Game%20in%20Honeypot-Enabled%20Networks%20for%20the%20Internet%20of%20Things&rft.jtitle=IEEE%20internet%20of%20things%20journal&rft.au=Quang%20Duy%20La&rft.date=2016-12-01&rft.volume=3&rft.issue=6&rft.spage=1025&rft.epage=1035&rft.pages=1025-1035&rft.issn=2327-4662&rft.eissn=2327-4662&rft.coden=IITJAU&rft_id=info:doi/10.1109/JIOT.2016.2547994&rft_dat=%3Cproquest_RIE%3E1858790843%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1858790843&rft_id=info:pmid/&rft_ieee_id=7442780&rfr_iscdi=true |