Abstract
A honeypot, which is a kind of deception strategy, has been widely used for at least 20 years to mitigate cyber threats. Decision-makers have believed that honeypot strategies are intuitive and effective, since honeypots have successfully protected systems from Denial-of-Service (DoS) attacks to Advanced Persistent Threats (APT) in real-world cases. Nonetheless, there is a lack of research on the appropriate level of honeypot technique application to choose real-world operations. We examine and contrast three attack-defense games with respect to honeypot detection techniques in this paper. In particular, we specifically design and contrast two stages of honeypot technology one by one, starting with a game without deception. We demonstrate that the return for a defender using honeypots is higher than for a defender without them, albeit the defender may not always benefit financially from using more honeypot deception strategies. Particularly, disguising regular servers as honeypots does not provide defenders with a better reward. Furthermore, we take in consideration that fake honeypots can make maintaining normal nodes more costly. Our research offers a theoretical foundation for the real-world operator's decision of honeypot deception tactics and the required number of honeypot nodes.
Original language | English |
---|---|
Title of host publication | MILCOM 2022 - 2022 IEEE Military Communications Conference |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 166-172 |
Number of pages | 7 |
ISBN (Electronic) | 9781665485340 |
DOIs | |
Publication status | Published - 2022 |
Event | 2022 IEEE Military Communications Conference, MILCOM 2022 - Rockville, United States Duration: 2022 Nov 28 → 2022 Dec 2 |
Publication series
Name | Proceedings - IEEE Military Communications Conference MILCOM |
---|---|
Volume | 2022-November |
Conference
Conference | 2022 IEEE Military Communications Conference, MILCOM 2022 |
---|---|
Country/Territory | United States |
City | Rockville |
Period | 22/11/28 → 22/12/2 |
Bibliographical note
Publisher Copyright:© 2022 IEEE.
Keywords
- cybersecurity
- game theory
- honeypot
- signaling game
ASJC Scopus subject areas
- Electrical and Electronic Engineering