A Game-Theoretic Analysis of Deception over Social Networks Using Fake Avatars

  • Amin Mohammadi
  • Mohammad Hossein Manshaei
  • Monireh Mohebbi Moghaddam
  • Quanyan Zhu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9996)

Abstract

In this paper, we formulate a deception game in networks in which the defender deploys a fake avatar for identification of the compromised internal user. We utilize signaling game to study the strategy of the deployed fake avatar when she interacts with external users. We consider a situation where the fake avatar as the defender is uncertain about the type of a connected external user, which can be a normal user or an attacker. We attempt to help the defender in selecting her best strategy, which is alerting to the system for detecting an attack or not alert. For this purpose, we analyze the game for finding the Perfect Bayesian Nash equilibria. Our analysis determines for which probability of the external user being an attacker, the defender should launch a defending mechanism.

Keywords

Network security Deception Fake avatar Social network Game theory Signaling game 

References

  1. 1.
    Virvilis, N., Serrano, O.S., Vanautgaerden, B.: Changing the game: the art of deceiving sophisticated attackers. In: 6th International Conference On Cyber Conflict (CyCon 2014), pp. 87–97. IEEE (2014)Google Scholar
  2. 2.
    Shen, S., Li, Y., Xu, H., Cao, Q.: Signaling game based strategy of intrusion detection in wireless sensor networks. Comput. Math. Appl. 62(6), 2404–2416 (2011)MathSciNetCrossRefMATHGoogle Scholar
  3. 3.
    Ahmad, A., Maynard, S.B., Park, S.: Information security strategies: towards an organizational multi-strategy perspective. J. Intell. Manuf. 25(2), 357–370 (2014)CrossRefGoogle Scholar
  4. 4.
    Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. Secur. Commun. Netw. 4(10), 1162–1172 (2011)CrossRefGoogle Scholar
  5. 5.
    Almeshekah, M.H., Spafford, E.H.: Planning and integrating deception into computer security defenses. In: Proceedings of the 2014 workshop on New Security Paradigms Workshop, pp. 127–138. ACM (2014)Google Scholar
  6. 6.
    Zarras, A.: The art of false alarms in the game of deception: leveraging fake honeypots for enhanced security. In: 2014 International Carnahan Conference onSecurity Technology (ICCST), pp. 1–6. IEEE (2014)Google Scholar
  7. 7.
    Wang, W., Bickford, J., Murynets, I., Subbaraman, R., Forte, A.G., Singaraju, G., et al.: Detecting targeted attacks by multilayer deception. J. Cyber Secur. Mob. 2(2), 175–199 (2013)CrossRefGoogle Scholar
  8. 8.
    Costarella, C., Chung, S., Endicott-Popovsky, B., Dittrich, D.: Hardening Honeynets against Honeypot-aware Botnet Attacks. University of Washington, US (2013)Google Scholar
  9. 9.
    Zhu, Q., Clark, A., Poovendran, R., Basar, T.: Deployment and exploitation of deceptive honeybots in social networks. In: Conference on Decision and Control. IEEE (2013)Google Scholar
  10. 10.
    Clark, A., Zhu, Q., Poovendran, R., Başar, T.: Deceptive routing in relay networks. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 171–185. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34266-0_10 CrossRefGoogle Scholar
  11. 11.
    Zhu, Q., Clark, A., Poovendran, R., Basar, T.: Deceptive routing games. In: IEEE 51st Conference on Decision and Control (CDC), pp. 2704–2711. IEEE (2012)Google Scholar
  12. 12.
    L’Huillier, G., Weber, R., Figueroa, N.: Online phishing classification using adversarial data mining and signaling games. In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, pp. 33–42. ACM (2009)Google Scholar
  13. 13.
    Ibrahimi, K., Altman, E., Haddad, M.: Signaling game-based approach to power control management in wireless networks. In: Proceedings of Performance monitoring and measurement of heterogeneous wireless and wired networks, pp. 139–144. ACM (2013)Google Scholar
  14. 14.
    Casey, W., Morales, J.A., Nguyen, T., Spring, J., Weaver, R., Wright, E., Metcalf, L., Mishra, B.: Cyber security via signaling games: toward a science of cyber security. In: Natarajan, R. (ed.) ICDCIT 2014. LNCS, vol. 8337, pp. 34–42. Springer, Heidelberg (2014). doi:10.1007/978-3-319-04483-5_4 CrossRefGoogle Scholar
  15. 15.
    Rahman, M.A., Manshaei, M.H., Al-Shaer, E.: A game-theoretic approach for deceiving remote operating system fingerprinting. In: 2013 IEEE Conference on Communications and Network Security (CNS), pp. 73–81. IEEE (2013)Google Scholar
  16. 16.
    Pawlick, J., Farhang, S., Zhu, Q.: Flip the cloud: cyber-physical signaling games in the presence of advanced persistent threats. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 289–308. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25594-1_16 CrossRefGoogle Scholar
  17. 17.
    Mohebbi Moghaddam, M., Manshaei, M.H., Zhu, Q.: To trust or not: a security signaling game between service provider and client. In: Khouzani, M.H.R., Panaousis, E., Theodorakopoulos, G. (eds.) GameSec 2015. LNCS, vol. 9406, pp. 322–333. Springer, Heidelberg (2015). doi:10.1007/978-3-319-25594-1_18 CrossRefGoogle Scholar
  18. 18.
    Pawlick, J., Zhu, Q.: Deception by design: evidence-based signaling games for network defense. arXiv preprint arXiv:1503.05458 (2015)
  19. 19.
    Patcha, A., Park, J.M.: A game theoretic formulation for intrusion detection in mobile ad hoc networks. IJ Netw. Secur. 2(2), 131–137 (2006)Google Scholar
  20. 20.
    Estiri, M., Khademzadeh, A.: A theoretical signaling game model for intrusion detection in wireless sensor networks. In: 2010 14th International Telecommunications Network Strategy and Planning Symposium (NETWORKS), pp. 1–6. IEEE (2010)Google Scholar
  21. 21.
    Liu, Y., Comaniciu, C., Man, H.: A bayesian game approach for intrusion detection in wireless ad hoc networks. In: Workshop on Game theory for communications and networks. ACM (2006)Google Scholar
  22. 22.
    Lin, J., Liu, P., Jing, J.: Using signaling games to model the multi-step attack-defense scenarios on confidentiality. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol. 7638, pp. 118–137. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34266-0_7 CrossRefGoogle Scholar
  23. 23.
    Shoham, Y., Leyton-Brown, K.: Multiagent Systems: Algorithmic, Game-theoretic, and Logical Foundations. Cambridge University Press, Cambridge (2008)CrossRefMATHGoogle Scholar
  24. 24.
    Gibbons, R.: Game Theory for Applied Economists. Princeton University Press, Princeton (1992)Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  • Amin Mohammadi
    • 1
  • Mohammad Hossein Manshaei
    • 1
  • Monireh Mohebbi Moghaddam
    • 1
  • Quanyan Zhu
    • 2
  1. 1.Department of Electrical and Computer EngineeringIsfahan University of TechnologyIsfahanIran
  2. 2.Department of Electrical and Computer EngineeringNew York UniversityNew YorkUSA

Personalised recommendations