首页> 外文会议>International conference on decision and game theory for security >A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense
【24h】

A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense

机译:基于诱饵的网络防御中IP地址随机化的博弈论方法

获取原文

摘要

Networks of decoy nodes protect cyber systems by distracting and misleading adversaries. Decoy defenses can be further enhanced by randomizing the space of node IP addresses, thus preventing an adversary from identifying and blacklisting decoy nodes over time. The decoy-based defense results in a time-varying interaction between the adversary, who attempts to identify and target real nodes, and the system, which deploys decoys and randomizes the address space in order to protect the identity of the real node. In this paper, we present a game-theoretic framework for modeling the strategic interaction between an external adversary and a network of decoy nodes. Our framework consists of two components. First, we model and study the interaction between the adversary and a single decoy node. We analyze the case where the adversary attempts to identify decoy nodes by examining the timing of node responses, as well as the case where the adversary identifies decoys via differences in protocol implementations between decoy and real nodes. Second, we formulate games with an adversary who attempts to find a real node in a network consisting of real and decoy nodes, where the time to detect whether a node is real or a decoy is derived from the equilibria of the games in first component. We derive the optimal policy of the system to randomize the IP address space in order to avoid detection of the real node, and prove that there is a unique threshold-based Stackelberg equilibrium for the game. Through simulation study, we find that the game between a single decoy and an adversary mounting timing-based attacks has a pure-strategy Nash equilibrium, while identification of decoy nodes via protocol implementation admits only mixed-strategy equilibria.
机译:诱饵节点网络通过分散和误导对手来保护网络系统。可以通过使节点IP地址的空间随机化来进一步增强诱饵防御能力,从而防止对手随着时间的推移识别和将诱饵节点列入黑名单。基于诱饵的防御导致试图识别并瞄准真实节点的对手与系统之间的时变交互,该系统部署诱饵并随机分配地址空间以保护真实节点的身份。在本文中,我们提出了一个博弈论框架,用于对外部对手与诱饵节点网络之间的战略互动进行建模。我们的框架由两个部分组成。首先,我们对对手和单个诱饵节点之间的交互进行建模和研究。我们分析了攻击者尝试通过检查节点响应的时间来识别诱饵节点的情况,以及攻击者通过诱饵和真实节点之间的协议实现差异来识别诱饵的情况。其次,我们与对手进行公式化的对抗,对手试图在由真实和诱饵节点组成的网络中查找真实节点,其中从一个第一部分的游戏平衡中得出检测节点是真实的还是诱饵的时间。为了避免检测到真实节点,我们推导了将IP地址空间随机化的系统最佳策略,并证明了该游戏具有唯一的基于阈值的Stackelberg平衡。通过仿真研究,我们发现单个诱饵与基于定时攻击的对手之间的博弈具有纯策略纳什均衡,而通过协议实现识别诱饵节点则仅允许混合策略均衡。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号