2018
DOI: 10.1007/978-3-319-99828-2_4
|View full text |Cite
|
Sign up to set email alerts
|

A Hypergame Analysis for ErsatzPasswords

Abstract: A hypergame is a game theoretic model capturing the decisions of rational players in a conflict where misperceptions, from deception or information asymmetry, are present. We demonstrate how hypergames can model an actual security mechanism: ErsatzPassword, a defense mechanism to protect password hashes from offline brute-force attacks. Two ErsatzPassword defensive strategies are considered: to block the attacker and trigger an alarm, or to redirect the attacker into a honeynet for attack analysis. We consider… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…A cyberdeception game can be formulated as a sequential game, (G, G A , G D ), where G is an original game and G A and G D are games perceived by an attacker and a defender, respectively [11]. When G = G A = G D , we obtain a conventional game as both players play the same game G. However, when the players play a hypergame with G A ̸ = G D , they view the game differently and take action accordingly [11,12,13]. To the best of our knowledge, no prior work has considered a cyberdeception hypergame dealing with multiple APT attackers.…”
Section: Introductionmentioning
confidence: 99%
“…A cyberdeception game can be formulated as a sequential game, (G, G A , G D ), where G is an original game and G A and G D are games perceived by an attacker and a defender, respectively [11]. When G = G A = G D , we obtain a conventional game as both players play the same game G. However, when the players play a hypergame with G A ̸ = G D , they view the game differently and take action accordingly [11,12,13]. To the best of our knowledge, no prior work has considered a cyberdeception hypergame dealing with multiple APT attackers.…”
Section: Introductionmentioning
confidence: 99%
“…Cyber conflicts can be divided into three kernels: misinterpretation, over-perception, and under-perception, which are the building blocks of modeling deception. These have been used in order to model the ErsatzPassword scheme, a security control that protects hashed passwords against brute force password-cracking [69]. The study delved into two techniques: triggering an alarm if an attacker uses a cracked password or redirecting the attacker to a honeynet.…”
Section: Optimisationmentioning
confidence: 99%