Active Deception using Factored Interactive POMDPs to Recognize Cyber Attacker's Intent

07/18/2020
by   Aditya Shinde, et al.
0

This paper presents an intelligent and adaptive agent that employs deception to recognize a cyber adversary's intent. Unlike previous approaches to cyber deception, which mainly focus on delaying or confusing the attackers, we focus on engaging with them to learn their intent. We model cyber deception as a sequential decision-making problem in a two-agent context. We introduce factored finitely nested interactive POMDPs (I-POMDPx) and use this framework to model the problem with multiple attacker types. Our approach models cyber attacks on a single honeypot host across multiple phases from the attacker's initial entry to reaching its adversarial objective. The defending I-POMDPx-based agent uses decoys to engage with the attacker at multiple phases to form increasingly accurate predictions of the attacker's behavior and intent. The use of I-POMDPs also enables us to model the adversary's mental state and investigate how deception affects their beliefs. Our experiments in both simulation and on a real host show that the I-POMDPx-based agent performs significantly better at intent recognition than commonly used deception strategies on honeypots.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/30/2022

An Analysis of Honeypots and their Impact as a Cyber Deception Tactic

This paper explores deploying a cyber honeypot system to learn how cyber...
research
01/05/2021

Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning

Cyber-attacks are increasing and varying dramatically day by day. It has...
research
04/03/2023

Learning About Simulated Adversaries from Human Defenders using Interactive Cyber-Defense Games

Given the increase in cybercrime, cybersecurity analysts (i.e. Defenders...
research
02/18/2020

Framework to Describe Intentions of a Cyber Attack Action

The techniques and tactics used by cyber adversaries are becoming more s...
research
02/18/2020

Cyberattack Action-Intent-Framework for Mapping Intrusion Observables

The techniques and tactics used by cyber adversaries are becoming more s...
research
01/10/2023

Chatbots in a Honeypot World

Question-and-answer agents like ChatGPT offer a novel tool for use as a ...
research
06/03/2023

Learning to Defend by Attacking (and Vice-Versa): Transfer of Learning in Cybersecurity Games

Designing cyber defense systems to account for cognitive biases in human...

Please sign up or login with your details

Forgot password? Click here to reset