Optimizing Vulnerability-Driven Honey Traffic Using Game Theory

02/21/2020
by   Iffat Anjum, et al.
0

Enterprises are increasingly concerned about adversaries that slowly and deliberately exploit resources over the course of months or even years. A key step in this kill chain is network reconnaissance, which has historically been active (e.g., network scans) and therefore detectable. However, new networking technology increases the possibility of passive network reconnaissance, which will be largely undetectable by defenders. In this paper, we propose Snaz, a technique that uses deceptively crafted honey traffic to confound the knowledge gained through passive network reconnaissance. We present a two-player non-zero-sum Stackelberg game model that characterizes how a defender should deploy honey traffic in the presence of an adversary who is aware of Snaz. In doing so, we demonstrate the existence of optimal defender strategies that will either dissuade an adversary from acting on the existence of real vulnerabilities observed within network traffic, or reveal the adversary's presence when it attempts to unknowingly attack an intrusion detection node.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/28/2018

Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits

We model and analyze passive adversaries that monitors Tor traffic cross...
research
10/12/2010

Conservation Law of Utility and Equilibria in Non-Zero Sum Games

This short note demonstrates how one can define a transformation of a no...
research
07/06/2021

SAGE: Intrusion Alert-driven Attack Graph Extractor

Attack graphs (AG) are used to assess pathways availed by cyber adversar...
research
11/01/2018

Adaptive MTD Security using Markov Game Modeling

Large scale cloud networks consist of distributed networking and computi...
research
06/06/2021

Adversarial Classification of the Attacks on Smart Grids Using Game Theory and Deep Learning

Smart grids are vulnerable to cyber-attacks. This paper proposes a game-...
research
07/01/2023

A game-theoretic approach to indistinguishability of winning objectives as user privacy

Game theory on graphs is a basic tool in computer science. In this paper...
research
08/07/2020

Role-Based Deception in Enterprise Networks

Historically, enterprise network reconnaissance is an active process, of...

Please sign up or login with your details

Forgot password? Click here to reset