A game-theoretic framework for dynamic cyber deception in Internet of Battlefield Things

被引:13
|
作者
Anwar, Ahmed H. [1 ]
Kamhoua, Charles [1 ]
Leslie, Nandi [1 ]
机构
[1] US Army Res Lab, Adelphi, MD 20783 USA
关键词
network security; game theory; cyber deception; IoBT;
D O I
10.1145/3360774.3368204
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cyber deception techniques are crucial to protect networks in battlefield settings and combat malicious cyber attacks. Cyber deception can effectively disrupt the surveillance process outcome of an adversary. In this paper, we propose a novel approach for cyber deception to protect important nodes and trap the adversary. We present a sequential approach of honeypot placement to defend and protect the network vital nodes. We formulate a stochastic game to study the dynamic interactions between the network administrator and the attacker. The defender makes strategic decisions about where to place honeypots to introduce new vulnerabilities to the network. The attacker's goal is to develop an attack strategy to compromise the nodes of the network by exploiting a set of known vulnerabilities. To consider a practical threat model, we assume that the attacker can only observe a noisy version of the network state. To this end, both players solve a partially observable stochastic game (POSG). Finally, we present a discussion on existing techniques to solve the formulated game and possible approaches to reduce the game complexity as part of our ongoing and future research.
引用
收藏
页码:522 / 526
页数:5
相关论文
共 50 条
  • [1] Game theoretic modeling of cyber deception in the Internet of Battlefield Things
    Kamhoua, Charles A.
    2018 56TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2018, : 862 - 862
  • [2] Game-Theoretic Modeling of Cyber Deception Against Epidemic Botnets in Internet of Things
    Tsemogne, Olivier
    Hayel, Yezekael
    Kamhoua, Charles
    Deugoue, Gabriel
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2678 - 2687
  • [3] FlipIn: A Game-Theoretic Cyber Insurance Framework for Incentive-Compatible Cyber Risk Management of Internet of Things
    Zhang, Rui
    Zhu, Quanyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 2026 - 2041
  • [4] Honeypot Allocation for Cyber Deception in Internet of Battlefield Things Systems
    Anwar, Ahmed H.
    Leslie, Nandi O.
    Kamhoua, Charles A.
    2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
  • [5] Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
    Park, Jeman
    Mohaisen, Aziz
    Kamhoua, Charles A.
    Weisman, Michael J.
    Leslie, Nandi O.
    Njilla, Laurent
    INFORMATION SECURITY APPLICATIONS, WISA 2019, 2020, 11897 : 299 - 312
  • [6] Jamming in the Internet of Things: A Game-Theoretic Perspective
    Namvar, Nima
    Saad, Walid
    Bahadori, Niloofar
    Kelley, Brian
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [7] A Game Theoretic Framework for Multi Domain Cyber Deception
    Hemida, Ahmed
    Asghar, Ahmed Bilal
    Kamhoua, Charles
    Kleinberg, Jon
    9TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS, EUROS&PW 2024, 2024, : 443 - 447
  • [8] On Random Dynamic Voltage Scaling for Internet-of-Things: A Game-Theoretic Approach
    Geng, Hui
    Kwiat, Kevin A.
    Kamhoua, Charles A.
    Shi, Yiyu
    IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2018, 37 (01) : 123 - 132
  • [9] Dynamic Resource Allocation for Power Distribution Internet of Things: a Game-Theoretic Model
    Li, Zhi
    Liu, Zhu
    Liu, Yanzhu
    Zhang, Nan
    Guo, Jing
    PROCEEDINGS OF THE 33RD CHINESE CONTROL AND DECISION CONFERENCE (CCDC 2021), 2021, : 1396 - 1400
  • [10] Predictive analytics for cyber-attack timing in power Internet of Things: A FlipIt game-theoretic approach
    Zheng, Tianshuai
    Du, Ye
    Hua, Kaisheng
    Wu, Xuesong
    Yuan, Shaosui
    Wang, Xiaolong
    Chen, Qifang
    Tan, Jinglei
    INTERNET OF THINGS, 2025, 30