×

Game theoretic model of strategic honeypot selection in computer networks. (English) Zbl 1377.68025

Grossklags, Jens (ed.) et al., Decision and game theory for security. Third international conference, GameSec 2012, Budapest, Hungary, November 5–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34265-3/pbk). Lecture Notes in Computer Science 7638, 201-220 (2012).
Summary: A honeypot is a decoy computer system used in network security to waste the time and resources of attackers and to analyze their behaviors. While there has been significant research on how to design honeypot systems, less is known about how to use honeypots strategically in network defense. Based on formal deception games, we develop two game-theoretic models that provide insight into how valuable should honeypots look like to maximize the probability that a rational attacker will attack a honeypot. The first model captures a static situation and the second allows attackers to imperfectly probe some of the systems on the network to determine which ones are likely to be real systems (and not honeypots) before launching an attack. We formally analyze the properties of the optimal strategies in the games and provide linear programs for their computation. Finally, we present the optimal solutions for a set of instances of the games and evaluate their quality in comparison to several baselines.
For the entire collection see [Zbl 1257.68024].

MSC:

68M10 Network design and communication in computer systems
91A40 Other game-theoretic models
91A80 Applications of game theory

Software:

Gambit
Full Text: DOI