Security

A Game Theoretic Investigation of Deception in Network Security

Free registration required

Executive Summary

The authors perform a game theoretic investigation of the effects of deception on the interactions between an attacker and a defender of a computer network. The defender can employ camouflage by either disguising a normal system as a honeypot, or by disguising a honeypot as a normal system. They model the interactions between defender and attacker using a signaling game, a non-cooperative two player dynamic game of incomplete information. For this model, they determine which strategies admit perfect Bayesian equilibria. These equilibria are refined Nash equilibria in which neither the defender nor the attacker will unilaterally choose to deviate from their strategies.

  • Format: PDF
  • Size: 102.4 KB