DocumentCode :
3324100
Title :
A Game Theoretic Investigation of Deception in Network Security
Author :
Carroll, Thomas E. ; Grosu, Daniel
Author_Institution :
Dept. of Comput. Sci., Wayne State Univ., Detroit, MI, USA
fYear :
2009
fDate :
3-6 Aug. 2009
Firstpage :
1
Lastpage :
6
Abstract :
We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot, or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, we determine which strategies admit perfect Bayesian equilibria. These equilibria are refined Nash equilibria in which neither the defender nor the attacker will unilaterally choose to deviate from their strategies. We discuss the benefits of employing deceptive equilibrium strategies in the defense of a computer network.
Keywords :
belief networks; computer networks; game theory; security of data; Nash equilibria; computer network; game theory; network security deception; noncooperative two player dynamic game; perfect Bayesian equilibria; signaling game; Bayesian methods; Computer hacking; Computer networks; Computer science; Computer security; Game theory; Information systems; Military computing; Protection; Uncertainty;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Communications and Networks, 2009. ICCCN 2009. Proceedings of 18th Internatonal Conference on
Conference_Location :
San Francisco, CA
ISSN :
1095-2055
Print_ISBN :
978-1-4244-4581-3
Electronic_ISBN :
1095-2055
Type :
conf
DOI :
10.1109/ICCCN.2009.5235344
Filename :
5235344
Link To Document :
بازگشت