Skip to main content

2020 | OriginalPaper | Buchkapitel

Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments

verfasst von : Jeman Park, Aziz Mohaisen, Charles A. Kamhoua, Michael J. Weisman, Nandi O. Leslie, Laurent Njilla

Erschienen in: Information Security Applications

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Internet of Battlefield Things (IoBT) is an emerging application to improve operational effectiveness for military applications. The security of IoBT is one of the more challenging aspects, where adversaries can exploit vulnerabilities in IoBT software and deployment conditions to gain insight into their state. In this work, we look into the security of IoBT from the lens of cyber deception. First, we formulate the IoBT domain as a graph learning problem from an adversarial point of view and introduce various tools through which an adversary can learn the graph starting with partial prior knowledge. Second, we use this model to show that an adversary can learn high-level information from low-level graph structures, including the number of soldiers and their proximity. For that, we use a powerful n-gram based algorithm to obtain features from random walks on the underlying graph representation of IoBT. Third, we provide microscopic and macroscopic approaches that manipulate the underlying IoBT graph structure to introduce uncertainty in the adversary’s learning. Finally, we show our approach’s effectiveness through analyses and evaluations.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Belkin, M., Niyogi, P.: Laplacian eigenmaps and spectral techniques for embedding and clustering. In: Proceedings of the NIPS (2002) Belkin, M., Niyogi, P.: Laplacian eigenmaps and spectral techniques for embedding and clustering. In: Proceedings of the NIPS (2002)
5.
Zurück zum Zitat Cheswick, B.: An evening with berferd in which a cracker is lured, endured, and studied. In: Proceedings of the USENIX Conference (1992) Cheswick, B.: An evening with berferd in which a cracker is lured, endured, and studied. In: Proceedings of the USENIX Conference (1992)
6.
Zurück zum Zitat Erdos, P., Rényi, A.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci. 5(1), 17–60 (1960)MathSciNetMATH Erdos, P., Rényi, A.: On the evolution of random graphs. Publ. Math. Inst. Hung. Acad. Sci. 5(1), 17–60 (1960)MathSciNetMATH
7.
Zurück zum Zitat Gallagher, B., Eliassi-Rad, T.: Leveraging label-independent features for classification in sparsely labeled networks: an empirical study. In: Proceedings of the SNAKDD (2010) Gallagher, B., Eliassi-Rad, T.: Leveraging label-independent features for classification in sparsely labeled networks: an empirical study. In: Proceedings of the SNAKDD (2010)
8.
Zurück zum Zitat Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of the ACM KDD (2016) Grover, A., Leskovec, J.: node2vec: scalable feature learning for networks. In: Proceedings of the ACM KDD (2016)
9.
Zurück zum Zitat Henderson, K., et al.: It’s who you know: graph mining using recursive structural features. In: Proceedings of the ACM KDD (2011) Henderson, K., et al.: It’s who you know: graph mining using recursive structural features. In: Proceedings of the ACM KDD (2011)
10.
Zurück zum Zitat Kott, A., Swami, A., West, B.J.: The internet of battle things. IEEE Comput. 49(12), 70–75 (2016) CrossRef Kott, A., Swami, A., West, B.J.: The internet of battle things. IEEE Comput. 49(12), 70–75 (2016) CrossRef
12.
Zurück zum Zitat Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013) Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:​1301.​3781 (2013)
14.
Zurück zum Zitat Pang, J., Zhang, Y.: DeepCity: a feature learning framework for mining location check-ins. arXiv preprint arXiv:1610.03676 (2016) Pang, J., Zhang, Y.: DeepCity: a feature learning framework for mining location check-ins. arXiv preprint arXiv:​1610.​03676 (2016)
15.
Zurück zum Zitat Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: Proceedings of the ACM KDD (2014) Perozzi, B., Al-Rfou, R., Skiena, S.: DeepWalk: online learning of social representations. In: Proceedings of the ACM KDD (2014)
16.
Zurück zum Zitat Provos, N.: Honeyd-a virtual honeypot daemon. In: Proceedings of the DFN-CERT Workshop (2003) Provos, N.: Honeyd-a virtual honeypot daemon. In: Proceedings of the DFN-CERT Workshop (2003)
17.
Zurück zum Zitat Roweis, S.T., Saul, L.K.: Nonlinear dimensionality reduction by locally linear embedding. Science 290(5500), 2323–2326 (2000)CrossRef Roweis, S.T., Saul, L.K.: Nonlinear dimensionality reduction by locally linear embedding. Science 290(5500), 2323–2326 (2000)CrossRef
18.
Zurück zum Zitat Spitzner, L.: The honeynet project: trapping the hackers. IEEE Secur. Priv. 99(2), 15–23 (2003)CrossRef Spitzner, L.: The honeynet project: trapping the hackers. IEEE Secur. Priv. 99(2), 15–23 (2003)CrossRef
19.
Zurück zum Zitat Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: LINE: large-scale information network embedding. In: Proceedings of the WWW (2015) Tang, J., Qu, M., Wang, M., Zhang, M., Yan, J., Mei, Q.: LINE: large-scale information network embedding. In: Proceedings of the WWW (2015)
Metadaten
Titel
Cyber Deception in the Internet of Battlefield Things: Techniques, Instances, and Assessments
verfasst von
Jeman Park
Aziz Mohaisen
Charles A. Kamhoua
Michael J. Weisman
Nandi O. Leslie
Laurent Njilla
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39303-8_23