Cyber Deception against Zero-day Attacks: A Game Theoretic Approach

07/24/2023
by   Md Abu Sayed, et al.
0

Reconnaissance activities precedent other attack steps in the cyber kill chain. Zero-day attacks exploit unknown vulnerabilities and give attackers the upper hand against conventional defenses. Honeypots have been used to deceive attackers by misrepresenting the true state of the network. Existing work on cyber deception does not model zero-day attacks. In this paper, we address the question of "How to allocate honeypots over the network?" to protect its most valuable assets. To this end, we develop a two-player zero-sum game theoretic approach to study the potential reconnaissance tracks and attack paths that attackers may use. However, zero-day attacks allow attackers to avoid placed honeypots by creating new attack paths. Therefore, we introduce a sensitivity analysis to investigate the impact of different zero-day vulnerabilities on the performance of the proposed deception technique. Next, we propose several mitigating strategies to defend the network against zero-day attacks based on this analysis. Finally, our numerical results validate our findings and illustrate the effectiveness of the proposed defense approach.

READ FULL TEXT
research
04/16/2018

A framework for mitigating zero-day attacks in IoT

Internet of Things (IoT) aims at providing connectivity between every co...
research
08/22/2023

Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach

Honeypots play a crucial role in implementing various cyber deception te...
research
06/10/2021

Myths and Misconceptions about Attackers and Attacks

This paper is based on a three year project during which we studied atta...
research
06/12/2019

Metrics Towards Measuring Cyber Agility

In cyberspace, evolutionary strategies are commonly used by both attacke...
research
11/29/2022

Sludge for Good: Slowing and Imposing Costs on Cyber Attackers

Choice architecture describes the design by which choices are presented ...
research
10/12/2018

How to Pick Your Friends - A Game Theoretic Approach to P2P Overlay Construction

A major limitation of open P2P networks is the lack of strong identities...
research
08/29/2018

Timelines for In-Code Discovery of Zero-Day Vulnerabilities and Supply-Chain Attacks

Zero-day vulnerabilities can be accidentally or maliciously placed in co...

Please sign up or login with your details

Forgot password? Click here to reset