A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

12/14/2017
by   Jeffrey Pawlick, et al.
0

Cyber attacks on both databases and critical infrastructure have threatened public and private sectors. Meanwhile, ubiquitous tracking and wearable computing have infringed upon privacy. Advocates and engineers have recently proposed using defensive deception as a means to leverage the information asymmetry typically enjoyed by attackers as a tool for defenders. The term deception, however, has been employed broadly and with a variety of meanings. In this paper, we survey 24 articles from 2007-2017 that use game theory to model defensive deception for cybersecurity and privacy. Then we propose a taxonomy that defines six types of deception: perturbation, moving target defense, obfuscation, mixing, honey-x, and attacker engagement. These types are delineated by their incentive structures, agents, actions, and duration: precisely concepts captured by game theory. Our aims are to rigorously define types of defensive deception, to capture a snapshot of the state of the literature, to provide a menu of models which can be used for applied research, and to identify promising areas for future work. Our taxonomy provides a systematic foundation for understanding different types of defensive deception commonly encountered in cybersecurity and privacy.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/03/2019

Game Theory for Cyber Deception: A Tutorial

Deceptive and anti-deceptive technologies have been developed for variou...
research
08/04/2017

Game theory models for communication between agents: a review

In the real world, agents or entities are in a continuous state of inter...
research
04/08/2021

Three Decades of Deception Techniques in Active Cyber Defense – Retrospect and Outlook

Deception techniques have been widely seen as a game changer in cyber de...
research
08/13/2020

A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries

Cyber deception is one of the key approaches used to mislead attackers b...
research
08/31/2021

Mapping breakpoint types: an exploratory study

Debugging is a relevant task for finding bugs during software developmen...
research
05/04/2018

Insight into Insiders: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures

Insider threats are one of today's most challenging cybersecurity issues...
research
01/22/2018

Get Your Workload in Order: Game Theoretic Prioritization of Database Auditing

For enhancing the privacy protections of databases, where the increasing...

Please sign up or login with your details

Forgot password? Click here to reset