Cyber Deception for Wireless Network Virtualization Using Stackelberg Game Theory

Wireless virtualization is becoming a popular solution to resource sharing problems integral in providing access to future wireless networking applications by enabling access to the same physical wireless infrastructure by multiple virtual networks concurrently. This paper investigates cyber deception using game theory model for defining the deceptive interactions between a cyber attacker and the defender. We consider both the naive attacker who is not aware of the defender's strategy, and the rational (powerful) attacker who knows the defense strategy. In the Stackelberg game, the defender controls the observable configuration of the network when probed by an attacker. We show that the process for selecting an optimal defense strategy against a naive attacker is NP-hard. We also proposed an algorithm for computing optimal strategy for a naive attacker and a greedy based algorithm for selecting the optimal strategy against a powerful attacker. Results from extensive simulation runs show the scalability and effectiveness of the proposed approaches based on the run time in finding the optimum defense strategy as well as minimizing the attacker's utility are better than the approaches in state of the art literature.

[1]  Marko Höyhtyä,et al.  Spectrum Occupancy Measurements: A Survey and Use of Interference Maps , 2016, IEEE Communications Surveys & Tutorials.

[2]  Tongwen Chen,et al.  Stochastic Detector against linear deception attacks on remote state estimation , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[3]  Insoo Koo,et al.  Feature Selection–Based Detection of Covert Cyber Deception Assaults in Smart Grid Communications Networks Using Machine Learning , 2018, IEEE Access.

[4]  Weihua Zhuang,et al.  Software Defined Networking Enabled Wireless Network Virtualization: Challenges and Solutions , 2017, IEEE Network.

[5]  Karl Henrik Johansson,et al.  Attack models and scenarios for networked control systems , 2012, HiCoNS '12.

[6]  Danda B. Rawat,et al.  Payoff Optimization Through Wireless Network Virtualization for IoT Applications: A Three Layer Game Approach , 2019, IEEE Internet of Things Journal.

[7]  Danda B. Rawat,et al.  Deceptor-in-the-Middle (DitM): Cyber Deception for Security in Wireless Network Virtualization , 2020, 2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC).

[8]  Danda B. Rawat,et al.  A novel approach for shared resource allocation with wireless network virtualization , 2017, 2017 IEEE International Conference on Communications Workshops (ICC Workshops).

[9]  Li Xu,et al.  Stackelberg game based relay selection for physical layer security and energy efficiency enhancement in cognitive radio networks , 2017, Appl. Math. Comput..

[10]  Haifeng Xu,et al.  Deceiving Cyber Adversaries: A Game Theoretic Approach , 2018, AAMAS.

[11]  Milind Tambe,et al.  Security and Game Theory - Algorithms, Deployed Systems, Lessons Learned , 2011 .

[12]  Shridatt Sugrim,et al.  On Defensive Cyber Deception: A Case Study Using SDN , 2018, MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM).

[13]  Danda B. Rawat,et al.  Fusion of Software Defined Networking, Edge Computing, and Blockchain Technology for Wireless Network Virtualization , 2019, IEEE Communications Magazine.

[14]  Tongwen Chen,et al.  False Data Injection Attacks on Networked Control Systems: A Stackelberg Game Analysis , 2018, IEEE Transactions on Automatic Control.