We perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ cam- ou?age by either disguising a normal system as a honeypot, or by disguising a honeypot as a normal system. We model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, we determine which strategies admit perfect Bayesian equilibria. These equilibria are re?ned Nash equilibria in which neither the defender nor the attacker will unilaterally choose to devi- ate from their strategies. We discuss the bene?ts of employing deceptive equilibrium strategies in the defense of a computer network.
Revised: September 22, 2011 |
Published: October 1, 2011
Citation
Carroll T.E., and D. Grosu. 2011.A Game Theoretic Investigation of Deception in Network Security.Security and Communication Networks 4, no. 10:1162-1172.PNNL-SA-73374.doi:10.1002/sec.242