Skip to main content

2017 | OriginalPaper | Buchkapitel

Bayesian Game Based Pseudo Honeypot Model in Social Networks

verfasst von : Miao Du, Yongzhong Li, Qing Lu, Kun Wang

Erschienen in: Cloud Computing and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we study applying honeypots to protect social networks against DDoS attacks. Different from previous works that study honeypots for DDoS attacks, we consider attackers are rational and know to optimize attacking strategies based on the defender’s strategy. To deal with such strategic attackers, we propose a novel pseudo honeypot game model following the Bayesian game setting. In addition, we rigorously prove the existence of Bayesian Nash equilibriums (BNEs) and show how to find them in all different cases. Simulations show the BNEs achieved in the games not only reduce energy consumption but also improve efficiency of the defense.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Wang, K., Yu, J., Liu, X., Guo, S.: A pre-authentication approach to proxy re-encryption in big data context. IEEE Trans. Big Data PP(99), 1 (2017) Wang, K., Yu, J., Liu, X., Guo, S.: A pre-authentication approach to proxy re-encryption in big data context. IEEE Trans. Big Data PP(99), 1 (2017)
4.
Zurück zum Zitat Jin, T., Yu, C., Yong, H., Wei, S.: SIP flooding attack detection with a multi-dimensional sketch design. IEEE Trans. Dependable Secure Comput. 11(6), 582–595 (2014)CrossRef Jin, T., Yu, C., Yong, H., Wei, S.: SIP flooding attack detection with a multi-dimensional sketch design. IEEE Trans. Dependable Secure Comput. 11(6), 582–595 (2014)CrossRef
5.
Zurück zum Zitat Du, M., Wang, K., Liu, X., Guo, S., Zhang, Y.: A differential privacy-based query model for sustainable fog data centers. IEEE Trans. Sustain. Comput. PP(99), 1 (2017) Du, M., Wang, K., Liu, X., Guo, S., Zhang, Y.: A differential privacy-based query model for sustainable fog data centers. IEEE Trans. Sustain. Comput. PP(99), 1 (2017)
6.
Zurück zum Zitat Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against DDoS flooding attacks. IEEE Commun. Surveys Tuts. 15(4), 2046–2069 (2013)CrossRef Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against DDoS flooding attacks. IEEE Commun. Surveys Tuts. 15(4), 2046–2069 (2013)CrossRef
7.
Zurück zum Zitat Wang, K., Du, M., Yang, D., Zhu, C., Shen, J., Zhang, Y.: Game theory-based active defense for intrusion detection in cyber-physical embedded systems. ACM Trans. Embedded Comput. Syst. 16(1), 18 (2016)CrossRef Wang, K., Du, M., Yang, D., Zhu, C., Shen, J., Zhang, Y.: Game theory-based active defense for intrusion detection in cyber-physical embedded systems. ACM Trans. Embedded Comput. Syst. 16(1), 18 (2016)CrossRef
9.
Zurück zum Zitat Wang, K., Wu, M.: Nash equilibrium of node cooperation based on metamodel for MANETs. J. Inf. Sci. Eng. 28(2), 317–333 (2012)MathSciNet Wang, K., Wu, M.: Nash equilibrium of node cooperation based on metamodel for MANETs. J. Inf. Sci. Eng. 28(2), 317–333 (2012)MathSciNet
10.
Zurück zum Zitat Peng, T., Leckie, C., Ramamohanarao, K.: Survey of networkbased defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 39(1), 60–67 (2007)CrossRef Peng, T., Leckie, C., Ramamohanarao, K.: Survey of networkbased defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 39(1), 60–67 (2007)CrossRef
11.
Zurück zum Zitat Wang, K., Zhuo, L., Shao, Y., Yue, D., Tsang, K.F.: Toward distributed data processing on intelligent leakpoints prediction in petrochemical industries. IEEE Trans. Ind. Inf. 12(6), 2091–2102 (2016)CrossRef Wang, K., Zhuo, L., Shao, Y., Yue, D., Tsang, K.F.: Toward distributed data processing on intelligent leakpoints prediction in petrochemical industries. IEEE Trans. Ind. Inf. 12(6), 2091–2102 (2016)CrossRef
12.
Zurück zum Zitat Chun-Jen, C., Khatkar, P., Tianyi, X., Jeongkeun, L., Dijiang, H.: NICE: network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans. Dependable Secure Comput. 10(4), 198–211 (2013)CrossRef Chun-Jen, C., Khatkar, P., Tianyi, X., Jeongkeun, L., Dijiang, H.: NICE: network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans. Dependable Secure Comput. 10(4), 198–211 (2013)CrossRef
13.
Zurück zum Zitat Jiang, H., Wang, K., Wang, Y., Gao, M., Zhang, Y.: Energy big data: a survey. IEEE Access 4, 3844–3861 (2016)CrossRef Jiang, H., Wang, K., Wang, Y., Gao, M., Zhang, Y.: Energy big data: a survey. IEEE Access 4, 3844–3861 (2016)CrossRef
14.
Zurück zum Zitat Wang, K., Wang, Y., Sun, Y., Guo, S., Wu, J.: Green industrial Internet of Things architecture: an energy-efficient perspective. IEEE Commun. Mag. 54(12), 48–54 (2016)CrossRef Wang, K., Wang, Y., Sun, Y., Guo, S., Wu, J.: Green industrial Internet of Things architecture: an energy-efficient perspective. IEEE Commun. Mag. 54(12), 48–54 (2016)CrossRef
15.
Zurück zum Zitat Beham, M., Vlad, M., Reiser, H.P.: Intrusion detection and honeypots in nested virtualization environments. In: Proceeding of IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 1–6 (2016) Beham, M., Vlad, M., Reiser, H.P.: Intrusion detection and honeypots in nested virtualization environments. In: Proceeding of IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 1–6 (2016)
16.
Zurück zum Zitat Wang, K., Yuan, L., Mizayaki, T., Sun, Y., Guo, S.: Anti-eavesdropping with selfish jamming in wireless networks: a bertrand game approach. IEEE Trans. Veh. Technol. (2016). doi:10.1109/TVT.2016.2639827 Wang, K., Yuan, L., Mizayaki, T., Sun, Y., Guo, S.: Anti-eavesdropping with selfish jamming in wireless networks: a bertrand game approach. IEEE Trans. Veh. Technol. (2016). doi:10.​1109/​TVT.​2016.​2639827
17.
Zurück zum Zitat Luo, J., Yang, X., Wang, J., Xu, J., Sun, J., Long, K.: On a mathematical model for low-rate shrew DDoS. IEEE Trans. Inf. Forensics Secur. 9(7), 1069–1083 (2014)CrossRef Luo, J., Yang, X., Wang, J., Xu, J., Sun, J., Long, K.: On a mathematical model for low-rate shrew DDoS. IEEE Trans. Inf. Forensics Secur. 9(7), 1069–1083 (2014)CrossRef
18.
Zurück zum Zitat Wang, K., Ouyang, Z., Krishnan, R., Shu, L., He, L.: A game theory based energy management system using price elasticity for smart grids. IEEE Trans. Ind. Inf. 11(6), 1607–1616 (2015)CrossRef Wang, K., Ouyang, Z., Krishnan, R., Shu, L., He, L.: A game theory based energy management system using price elasticity for smart grids. IEEE Trans. Ind. Inf. 11(6), 1607–1616 (2015)CrossRef
19.
Zurück zum Zitat Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proceeding of Network and Distributed Systems Security, pp. 191–206 (2003) Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proceeding of Network and Distributed Systems Security, pp. 191–206 (2003)
20.
Zurück zum Zitat Wang, K., Du, M., Sun, Y., Vinel, A., Zhang, Y.: Attack detection and distributed forensics in M2M networks. IEEE Netw. 30(6), 49–55 (2016)CrossRef Wang, K., Du, M., Sun, Y., Vinel, A., Zhang, Y.: Attack detection and distributed forensics in M2M networks. IEEE Netw. 30(6), 49–55 (2016)CrossRef
21.
Zurück zum Zitat Zhan, Z., Xu, M., Xu, S.: Characterizing honeypot-captured cyber attacks: Statistical framework and case study. IEEE Trans. Inf. Forensics Security 8(11), 1775–1789 (2013)CrossRef Zhan, Z., Xu, M., Xu, S.: Characterizing honeypot-captured cyber attacks: Statistical framework and case study. IEEE Trans. Inf. Forensics Security 8(11), 1775–1789 (2013)CrossRef
22.
Zurück zum Zitat Wang, K., Du, M., Maharjan, S., Sun, Y.: Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid (2017). doi:10.1109/TSG.2017.2670144 Wang, K., Du, M., Maharjan, S., Sun, Y.: Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid (2017). doi:10.​1109/​TSG.​2017.​2670144
Metadaten
Titel
Bayesian Game Based Pseudo Honeypot Model in Social Networks
verfasst von
Miao Du
Yongzhong Li
Qing Lu
Kun Wang
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-68542-7_6