Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security

An important element in the mathematical and scientific foundations for security is modeling the strategic use of deception and information manipulation. We argue that game theory provides an important theoretical framework for reasoning about information manipulation in adversarial settings, including deception and randomization strategies. In addition, game theory has practical uses in determining optimal strategies for randomized patrolling and resource allocation. We discuss three game-theoretic models that capture aspects of how honeypots can be used in network security. Honeypots are fake hosts introduced into a network to gather information about attackers and to distract them from real targets. They are a limited resource, so there are important strategic questions about how to deploy them to the greatest effect, which is fundamentally about deceiving attackers into choosing fake targets instead of real ones to attack. We describe several game models that address strategies for deploying honeypots, including a basic honeypot selection game, an extension of this game that allows additional probing actions by the attacker, and finally a version in which attacker strategies are represented using attack graphs. We conclude with a discussion of the strengths and limitations of game theory in the context of network security.

[1]  Angelos D. Keromytis,et al.  Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.

[2]  King Tak Lee On a deception game with three boxes , 1993 .

[3]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[4]  J. Nash NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.

[5]  Manish Jain,et al.  Computing optimal randomized resource allocations for massive security games , 2009, AAMAS 2009.

[6]  Viliam Lisý,et al.  Computing Optimal Attack Strategies Using Unconstrained Influence Diagrams , 2013, PAISI.

[7]  Xinming Ou,et al.  A scalable approach to attack graph generation , 2006, CCS '06.

[8]  Branislav Bosanský,et al.  Double-oracle algorithm for computing an exact nash equilibrium in zero-sum extensive-form games , 2013, AAMAS.

[9]  Richard Lippmann,et al.  Practical Attack Graph Generation for Network Defense , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[10]  Sarit Kraus,et al.  Deployed ARMOR protection: the application of a game theoretic model for security at the Los Angeles International Airport , 2008, AAMAS 2008.

[11]  Giuseppe Persiano,et al.  Special Issue on Algorithmic Game Theory , 2013, Theory of Computing Systems.

[12]  Joel Spencer,et al.  A deception game , 1973 .

[13]  Milind Tambe,et al.  GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.

[14]  Neil C. Rowe,et al.  Defending Cyberspace with Fake Honeypots , 2007, J. Comput..

[15]  Ahto Buldas,et al.  Upper Bounds for Adversaries' Utility in Attack Trees , 2012, GameSec.

[16]  Vincent Conitzer,et al.  A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.

[17]  Tuomas Sandholm,et al.  Lossy stochastic game abstraction with bounds , 2012, EC '12.

[18]  Milind Tambe,et al.  Bayesian Security Games for Controlling Contagion , 2013, 2013 International Conference on Social Computing.

[19]  D. Fudenberg,et al.  The Theory of Learning in Games , 1998 .

[20]  Branislav Bosanský,et al.  Game Theoretic Model of Strategic Honeypot Selection in Computer Networks , 2012, GameSec.

[21]  Milind Tambe,et al.  Security and Game Theory: IRIS – A Tool for Strategic Security Allocation in Transportation Networks , 2011, AAMAS 2011.

[22]  Fred Cohen A Mathematical Structure of Simple Defensive Network Deception , 2000, Comput. Secur..

[23]  Viliam Lisý,et al.  Computing Optimal Policies for Attack Graphs with Action Failures and Costs , 2014, STAIRS.

[24]  Christopher Kiekintveld,et al.  Empirical Game-Theoretic Methods for Strategy Design and Analysis in Complex Games , 2007, AAAI.

[25]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[26]  Bruce Bueno de Mesquita,et al.  An Introduction to Game Theory , 2014 .

[27]  Tuomas Sandholm,et al.  The State of Solving Large Incomplete-Information Games, and Application to Poker , 2010, AI Mag..

[28]  ปิยดา สมบัติวัฒนา Behavioral Game Theory: Experiments in Strategic Interaction , 2013 .

[29]  Bo An,et al.  PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.

[30]  Juliane Hahn,et al.  Security And Game Theory Algorithms Deployed Systems Lessons Learned , 2016 .

[31]  Thorsten Holz,et al.  NoSEBrEaK - attacking honeynets , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..