A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries

08/13/2020
by   Dayong Ye, et al.
0

Cyber deception is one of the key approaches used to mislead attackers by hiding or providing inaccurate system information. There are two main factors limiting the real-world application of existing cyber deception approaches. The first limitation is that the number of systems in a network is assumed to be fixed. However, in the real world, the number of systems may be dynamically changed. The second limitation is that attackers' strategies are simplified in the literature. However, in the real world, attackers may be more powerful than theory suggests. To overcome these two limitations, we propose a novel differentially private game theoretic approach to cyber deception. In this proposed approach, a defender adopts differential privacy mechanisms to strategically change the number of systems and obfuscate the configurations of systems, while an attacker adopts a Bayesian inference approach to infer the real configurations of systems. By using the differential privacy technique, the proposed approach can 1) reduce the impacts on network security resulting from changes in the number of systems and 2) resist attacks regardless of attackers' reasoning power. The experimental results demonstrate the effectiveness of the proposed approach.

READ FULL TEXT

page 4

page 5

page 6

page 7

page 8

page 9

page 10

page 15

research
08/21/2020

Low Influence, Utility, and Independence in Differential Privacy: A Curious Case of 3 2

We study the relationship between randomized low influence functions and...
research
09/20/2019

Manipulation Attacks in Local Differential Privacy

Local differential privacy is a widely studied restriction on distribute...
research
10/27/2016

Differentially Private Variational Inference for Non-conjugate Models

Many machine learning applications are based on data collected from peop...
research
08/22/2023

Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach

Honeypots play a crucial role in implementing various cyber deception te...
research
08/02/2023

BRNES: Enabling Security and Privacy-aware Experience Sharing in Multiagent Robotic and Autonomous Systems

Although experience sharing (ES) accelerates multiagent reinforcement le...
research
01/22/2018

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing

For enhancing the privacy protections of databases, where the increasing...
research
12/14/2017

A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

Cyber attacks on both databases and critical infrastructure have threate...

Please sign up or login with your details

Forgot password? Click here to reset