A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars

In this paper, we formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user. We utilize signaling game to study the strategy of the deployed fake avatar when she interacts with external users. We consider a situation where the fake avatar as the defender is uncertain about the type of a connected external user, which can be a normal user or an attacker. We attempt to help the defender in selecting her best strategy, which is alerting to the system for detecting an attack or not alert. For this purpose, we analyze the game for finding the Perfect Bayesian Nash equilibria. Our analysis determines for which probability of the external user being an attacker, the defender should launch a defending mechanism.

[1]  R. Gibbons Game theory for applied economists , 1992 .

[2]  Sean B. Maynard,et al.  Information security strategies: towards an organizational multi-strategy perspective , 2014, J. Intell. Manuf..

[3]  Cristina Comaniciu,et al.  A Bayesian game approach for intrusion detection in wireless ad hoc networks , 2006, GameNets '06.

[4]  Eitan Altman,et al.  Signaling game-based approach to power control management in wireless networks , 2013, PM2HW2N '13.

[5]  Oscar Serrano Serrano,et al.  Changing the game: The art of deceiving sophisticated attackers , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).

[6]  Jung-Min Park,et al.  A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks , 2006, Int. J. Netw. Secur..

[7]  Quanyan Zhu,et al.  Deployment and exploitation of deceptive honeybots in social networks , 2012, 52nd IEEE Conference on Decision and Control.

[8]  Quanyan Zhu,et al.  Deception by Design: Evidence-Based Signaling Games for Network Defense , 2015, WEIS.

[9]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[10]  Yuanjie Li,et al.  Signaling game based strategy of intrusion detection in wireless sensor networks , 2011, Comput. Math. Appl..

[11]  Jonathan M. Spring,et al.  Cyber Security via Signaling Games: Toward a Science of Cyber Security , 2014, ICDCIT.

[12]  Mohammed H. Almeshekah,et al.  Planning and Integrating Deception into Computer Security Defenses , 2014, NSPW '14.

[13]  Quanyan Zhu,et al.  Deceptive Routing in Relay Networks , 2012, GameSec.

[14]  Apostolis Zarras,et al.  The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security , 2014, 2014 International Carnahan Conference on Security Technology (ICCST).

[15]  Daniel Grosu,et al.  A Game Theoretic Investigation of Deception in Network Security , 2009, ICCCN.

[16]  Ahmad Khademzadeh,et al.  A theoretical signaling game model for intrusion detection in wireless sensor networks , 2010, 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS).

[17]  Quanyan Zhu,et al.  Deceptive routing games , 2012, 2012 IEEE 51st IEEE Conference on Decision and Control (CDC).

[18]  Peng Liu,et al.  Using Signaling Games to Model the Multi-step Attack-Defense Scenarios on Confidentiality , 2012, GameSec.

[19]  Quanyan Zhu,et al.  Flip the Cloud: Cyber-Physical Signaling Games in the Presence of Advanced Persistent Threats , 2015, GameSec.

[20]  Quanyan Zhu,et al.  To Trust or Not: A Security Signaling Game Between Service Provider and Client , 2015, GameSec.

[21]  Richard Weber,et al.  Online phishing classification using adversarial data mining and signaling games , 2010, SKDD.

[22]  Wei Wang,et al.  Detecting Targeted Attacks By Multilayer Deception , 2013, J. Cyber Secur. Mobil..

[23]  Ehab Al-Shaer,et al.  A game-theoretic approach for deceiving Remote Operating System Fingerprinting , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).