Skip to main content

2016 | OriginalPaper | Buchkapitel

A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars

verfasst von : Amin Mohammadi, Mohammad Hossein Manshaei, Monireh Mohebbi Moghaddam, Quanyan Zhu

Erschienen in: Decision and Game Theory for Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper, we formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user. We utilize signaling game to study the strategy of the deployed fake avatar when she interacts with external users. We consider a situation where the fake avatar as the defender is uncertain about the type of a connected external user, which can be a normal user or an attacker. We attempt to help the defender in selecting her best strategy, which is alerting to the system for detecting an attack or not alert. For this purpose, we analyze the game for finding the Perfect Bayesian Nash equilibria. Our analysis determines for which probability of the external user being an attacker, the defender should launch a defending mechanism.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
As fake avatars have been deployed by defender in our model, we use these words interchangeably.
 
Literatur
1.
Zurück zum Zitat Virvilis, N., Serrano, O.S., Vanautgaerden, B.: Changing the game: the art of deceiving sophisticated attackers. In: 6th International Conference On Cyber Conflict (CyCon 2014), pp. 87–97. IEEE (2014) Virvilis, N., Serrano, O.S., Vanautgaerden, B.: Changing the game: the art of deceiving sophisticated attackers. In: 6th International Conference On Cyber Conflict (CyCon 2014), pp. 87–97. IEEE (2014)
2.
Zurück zum Zitat Shen, S., Li, Y., Xu, H., Cao, Q.: Signaling game based strategy of intrusion detection in wireless sensor networks. Comput. Math. Appl. 62(6), 2404–2416 (2011)MathSciNetCrossRefMATH Shen, S., Li, Y., Xu, H., Cao, Q.: Signaling game based strategy of intrusion detection in wireless sensor networks. Comput. Math. Appl. 62(6), 2404–2416 (2011)MathSciNetCrossRefMATH
3.
Zurück zum Zitat Ahmad, A., Maynard, S.B., Park, S.: Information security strategies: towards an organizational multi-strategy perspective. J. Intell. Manuf. 25(2), 357–370 (2014)CrossRef Ahmad, A., Maynard, S.B., Park, S.: Information security strategies: towards an organizational multi-strategy perspective. J. Intell. Manuf. 25(2), 357–370 (2014)CrossRef
4.
Zurück zum Zitat Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. Secur. Commun. Netw. 4(10), 1162–1172 (2011)CrossRef Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. Secur. Commun. Netw. 4(10), 1162–1172 (2011)CrossRef
5.
Zurück zum Zitat Almeshekah, M.H., Spafford, E.H.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 workshop on New Security Paradigms Workshop, pp. 127–138. ACM (2014) Almeshekah, M.H., Spafford, E.H.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 workshop on New Security Paradigms Workshop, pp. 127–138. ACM (2014)
6.
Zurück zum Zitat Zarras, A.: The art of false alarms in the game of deception: leveraging fake honeypots for enhanced security. In: 2014 International Carnahan Conference onSecurity Technology (ICCST), pp. 1–6. IEEE (2014) Zarras, A.: The art of false alarms in the game of deception: leveraging fake honeypots for enhanced security. In: 2014 International Carnahan Conference onSecurity Technology (ICCST), pp. 1–6. IEEE (2014)
7.
Zurück zum Zitat Wang, W., Bickford, J., Murynets, I., Subbaraman, R., Forte, A.G., Singaraju, G., et al.: Detecting targeted attacks by multilayer deception. J. Cyber Secur. Mob. 2(2), 175–199 (2013)CrossRef Wang, W., Bickford, J., Murynets, I., Subbaraman, R., Forte, A.G., Singaraju, G., et al.: Detecting targeted attacks by multilayer deception. J. Cyber Secur. Mob. 2(2), 175–199 (2013)CrossRef
8.
Zurück zum Zitat Costarella, C., Chung, S., Endicott-Popovsky, B., Dittrich, D.: Hardening Honeynets against Honeypot-aware Botnet Attacks. University of Washington, US (2013) Costarella, C., Chung, S., Endicott-Popovsky, B., Dittrich, D.: Hardening Honeynets against Honeypot-aware Botnet Attacks. University of Washington, US (2013)
9.
Zurück zum Zitat Zhu, Q., Clark, A., Poovendran, R., Basar, T.: Deployment and exploitation of deceptive honeybots in social networks. In: Conference on Decision and Control. IEEE (2013) Zhu, Q., Clark, A., Poovendran, R., Basar, T.: Deployment and exploitation of deceptive honeybots in social networks. In: Conference on Decision and Control. IEEE (2013)
10.
Zurück zum Zitat Clark, A., Zhu, Q., Poovendran, R., Başar, T.: Deceptive routing in relay networks. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 171–185. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34266-0_10 CrossRef Clark, A., Zhu, Q., Poovendran, R., Başar, T.: Deceptive routing in relay networks. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 171–185. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-34266-0_​10 CrossRef
11.
Zurück zum Zitat Zhu, Q., Clark, A., Poovendran, R., Basar, T.: Deceptive routing games. In: IEEE 51st Conference on Decision and Control (CDC), pp. 2704–2711. IEEE (2012) Zhu, Q., Clark, A., Poovendran, R., Basar, T.: Deceptive routing games. In: IEEE 51st Conference on Decision and Control (CDC), pp. 2704–2711. IEEE (2012)
12.
Zurück zum Zitat L’Huillier, G., Weber, R., Figueroa, N.: Online phishing classification using adversarial data mining and signaling games. In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, pp. 33–42. ACM (2009) L’Huillier, G., Weber, R., Figueroa, N.: Online phishing classification using adversarial data mining and signaling games. In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, pp. 33–42. ACM (2009)
13.
Zurück zum Zitat Ibrahimi, K., Altman, E., Haddad, M.: Signaling game-based approach to power control management in wireless networks. In: Proceedings of Performance monitoring and measurement of heterogeneous wireless and wired networks, pp. 139–144. ACM (2013) Ibrahimi, K., Altman, E., Haddad, M.: Signaling game-based approach to power control management in wireless networks. In: Proceedings of Performance monitoring and measurement of heterogeneous wireless and wired networks, pp. 139–144. ACM (2013)
14.
Zurück zum Zitat Casey, W., Morales, J.A., Nguyen, T., Spring, J., Weaver, R., Wright, E., Metcalf, L., Mishra, B.: Cyber security via signaling games: toward a science of cyber security. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol. 8337, pp. 34–42. Springer, Heidelberg (2014). doi:10.1007/978-3-319-04483-5_4 CrossRef Casey, W., Morales, J.A., Nguyen, T., Spring, J., Weaver, R., Wright, E., Metcalf, L., Mishra, B.: Cyber security via signaling games: toward a science of cyber security. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol. 8337, pp. 34–42. Springer, Heidelberg (2014). doi:10.​1007/​978-3-319-04483-5_​4 CrossRef
15.
Zurück zum Zitat Rahman, M.A., Manshaei, M.H., Al-Shaer, E.: A game-theoretic approach for deceiving remote operating system fingerprinting. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 73–81. IEEE (2013) Rahman, M.A., Manshaei, M.H., Al-Shaer, E.: A game-theoretic approach for deceiving remote operating system fingerprinting. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 73–81. IEEE (2013)
16.
Zurück zum Zitat Pawlick, J., Farhang, S., Zhu, Q.: Flip the cloud: cyber-physical signaling games in the presence of advanced persistent threats. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 289–308. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25594-1_16 CrossRef Pawlick, J., Farhang, S., Zhu, Q.: Flip the cloud: cyber-physical signaling games in the presence of advanced persistent threats. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 289–308. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-25594-1_​16 CrossRef
17.
Zurück zum Zitat Mohebbi Moghaddam, M., Manshaei, M.H., Zhu, Q.: To trust or not: a security signaling game between service provider and client. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 322–333. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25594-1_18 CrossRef Mohebbi Moghaddam, M., Manshaei, M.H., Zhu, Q.: To trust or not: a security signaling game between service provider and client. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 322–333. Springer, Heidelberg (2015). doi:10.​1007/​978-3-319-25594-1_​18 CrossRef
18.
Zurück zum Zitat Pawlick, J., Zhu, Q.: Deception by design: evidence-based signaling games for network defense. arXiv preprint arXiv:1503.05458 (2015) Pawlick, J., Zhu, Q.: Deception by design: evidence-based signaling games for network defense. arXiv preprint arXiv:​1503.​05458 (2015)
19.
Zurück zum Zitat Patcha, A., Park, J.M.: A game theoretic formulation for intrusion detection in mobile ad hoc networks. IJ Netw. Secur. 2(2), 131–137 (2006) Patcha, A., Park, J.M.: A game theoretic formulation for intrusion detection in mobile ad hoc networks. IJ Netw. Secur. 2(2), 131–137 (2006)
20.
Zurück zum Zitat Estiri, M., Khademzadeh, A.: A theoretical signaling game model for intrusion detection in wireless sensor networks. In: 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS), pp. 1–6. IEEE (2010) Estiri, M., Khademzadeh, A.: A theoretical signaling game model for intrusion detection in wireless sensor networks. In: 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS), pp. 1–6. IEEE (2010)
21.
Zurück zum Zitat Liu, Y., Comaniciu, C., Man, H.: A bayesian game approach for intrusion detection in wireless ad hoc networks. In: Workshop on Game theory for communications and networks. ACM (2006) Liu, Y., Comaniciu, C., Man, H.: A bayesian game approach for intrusion detection in wireless ad hoc networks. In: Workshop on Game theory for communications and networks. ACM (2006)
22.
Zurück zum Zitat Lin, J., Liu, P., Jing, J.: Using signaling games to model the multi-step attack-defense scenarios on confidentiality. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 118–137. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34266-0_7 CrossRef Lin, J., Liu, P., Jing, J.: Using signaling games to model the multi-step attack-defense scenarios on confidentiality. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 118–137. Springer, Heidelberg (2012). doi:10.​1007/​978-3-642-34266-0_​7 CrossRef
23.
Zurück zum Zitat Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2008)CrossRefMATH Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2008)CrossRefMATH
24.
Zurück zum Zitat Gibbons, R.: Game Theory for Applied Economists. Princeton University Press, Princeton (1992) Gibbons, R.: Game Theory for Applied Economists. Princeton University Press, Princeton (1992)
Metadaten
Titel
A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars
verfasst von
Amin Mohammadi
Mohammad Hossein Manshaei
Monireh Mohebbi Moghaddam
Quanyan Zhu
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-47413-7_22

Premium Partner