Visible to the public Concealing Cyber-Decoys using Two-Sided Feature Deception GamesConflict Detection Enabled

TitleConcealing Cyber-Decoys using Two-Sided Feature Deception Games
Publication TypeConference Paper
Year of Publication2019
AuthorsMohammad Sujan Miah, Marcus Gutierrez, Oscar Veliz, Omkar Thakoor, Christopher Kiekintveld
Conference Name10th International Workshop on Optimization in Multi-agent Systems 2019
Date PublishedMay 14, 2019
KeywordsCognitive Security, Cognitive Security in Cyber, Cyber-Decoys, Deception Games
Abstract

An increasingly important tool for securing computer net- works is the use of deceptive decoy objects (e.g., fake hosts, accounts, or files) to detect, confuse, and distract attackers. One of the well-known challenges in using decoys is that it can be difficult to design effective decoys that are hard to distinguish from real objects, especially against sophisticated attackers who may be aware of the use of decoys. A key issue is that both real and decoy objects may have observable features that may give the attacker the ability to distinguish one from the other. However, a defender deploying decoys may be able to modify some features of either the real or decoy objects (at some cost) making the decoys more effective. We present a game-theoretic model of two-sided deception that models this scenario. We present an empirical analysis of this model to show strategies for effectively concealing decoys, as well as some limitations of decoys for cyber security.

URLhttps://www2.isye.gatech.edu/~fferdinando3/cfp/OPTMAS19/papers/paper_5.pdf
Citation Keynode-62619