A game theoretic model for enabling honeypots in IoT networks

Honeypots have been considered as one of the methods to ensure security for networks in the Internet of Things (IoT) realm. In this paper, we study the problem of defending against attacks in honeypot-enabled networks by looking at a game-theoretic model of deception involving an attacker and a defender. The attacker may try to deceive the defender by employing different types of attacks ranging from a suspicious to a seemingly normal activity, while the defender in turn can make use of honeypots as a tool of deception to trap attackers. The problem is modeled as a Bayesian game of incomplete information, where equilibria are identified for both the one-shot game and the repeated game versions. Our results showed that there is a threshold for the frequency of active attackers, above which both players will take deceptive actions and below which the defender can mix up his/her strategy while keeping the attackers success rate low.

[1]  Robert L. Devaney,et al.  A First Course In Chaotic Dynamical Systems: Theory And Experiment , 1993 .

[2]  Yang Xiao,et al.  Game Theory for Network Security , 2013, IEEE Communications Surveys & Tutorials.

[3]  Weiyi Liu,et al.  Security analysis for Cyber-Physical Systems against stealthy deception attacks , 2013, 2013 American Control Conference.

[4]  Shambhu Upadhyaya,et al.  A Deception Framework for Survivability Against Next Generation Cyber Attacks , 2012 .

[5]  Weizhe Zhang,et al.  Security Architecture of the Internet of Things Oriented to Perceptual Layer , 2013 .

[6]  Michael Massoth,et al.  Honeypot Framework for Wireless Sensor Networks , 2013, MoMM '13.

[7]  Donald C. Daniel,et al.  Strategic military deception , 1982 .

[8]  N. Garg,et al.  Deception in Honeynets: A Game-Theoretic Analysis , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[9]  Branislav Bosanský,et al.  Game Theoretic Model of Strategic Honeypot Selection in Computer Networks , 2012, GameSec.

[10]  Peng Liu,et al.  Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality , 2012, GameSec.

[11]  Daniel Grosu,et al.  A Game Theoretic Investigation of Deception in Network Security , 2009, ICCCN.

[12]  Chelsea Dobbins,et al.  Guest Editorial Special Issue on: Big Data Analytics in Intelligent Systems , 2015 .

[13]  Amr M. Youssef,et al.  A game theoretic investigation for high interaction honeypots , 2012, 2012 IEEE International Conference on Communications (ICC).

[14]  David M. Kreps,et al.  Signaling Games and Stable Equilibria , 1987 .