2016
DOI: 10.1109/jiot.2016.2547994
|View full text |Cite
|
Sign up to set email alerts
|

Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
78
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 148 publications
(78 citation statements)
references
References 16 publications
0
78
0
Order By: Relevance
“…The authors in [8] design a proactive defense scheme where the defender can manipulate the adversary's belief. In particular, many works [7], [16] including ones with game-theoretic models [22], [12] focus on adaptive honeypot deployment to effectively engage attackers and gather information without attackers' notice. However, few works investigate timing issues and risk assessment during the honeypot interaction.…”
Section: A Related Workmentioning
confidence: 99%
“…The authors in [8] design a proactive defense scheme where the defender can manipulate the adversary's belief. In particular, many works [7], [16] including ones with game-theoretic models [22], [12] focus on adaptive honeypot deployment to effectively engage attackers and gather information without attackers' notice. However, few works investigate timing issues and risk assessment during the honeypot interaction.…”
Section: A Related Workmentioning
confidence: 99%
“…Sedjelmaci et al [92] introduce an anomaly detection approach that tries to minimize [78] Machine Learning Anomaly DoS, Hello Flood, Sybil, Sinkhole attacks Arrington et al [79] Statistical Detection Anomaly N/A Arshad et al [80] Distributed and Collaborative Anomaly Routing and application specific attacks Azmoodeh et al [81] Machine Learning Anomaly Junk code insertion attacks Cervantes et al [82] Reputation Anomaly Sinkhole Attacks Fu et al [83] Statistical Detection Anomaly Bad Data Injection, DoS Kasinathan et al [84] Distributed and Collaborative Rule DoS Khan and Herrmann [43] Reputation Rule Selective Forwarding, Sinkhole, Version Number Khan et al [85] Reputation Rule Self Promoting, Bad Mouthing, Ballot Stuffing La et al [86] Game Theory Rule N/A Li et al [87] Machine Learning Anomaly Probing, DoS Liu et al [88] Distributed and Collaborative Rule N/A Liu and Wu [89] Statistical Detection Anomaly N/A Liu et al [90] Machine Learning Anomaly N/A Raza et al [91] Distributed and Collaborative Hybrid Spoofing, Sinkhole, Selective Forwarding Sedjelmaci et al [92] Game Theory Anomaly DoS Summerville et al [93] Statistical Detection Anomaly Wormhole, Bad Data Injection, User-to-Root Xiao et al [94] Machine Learning Anomaly Identity based, Malwares, Offloading attacks Yang et al [95] Machine Learning Anomaly Packet dropping, hole attacks, eavesdropping the energy consumption. In particular, game theory is used to find out whether the signature of a new attack is expected to occur.…”
Section: Game Theory-based Idssmentioning
confidence: 99%
“…Only then, the energy-intensive anomaly detection is activated. La et al [86] propose a model which comprehends attacks of varying seriousness that demand different degrees of action. The problem is modeled as a Bayesian game and its results determine the threshold to declare an activity as an intrusion.…”
Section: Game Theory-based Idssmentioning
confidence: 99%
“…Our problem, on the other hand, considers one of the two participants having both a beneficial and harmful objective, and consequently its models do not extend directly to our communication problem where the secondary user can inflict wireless interference. In [16], a signaling game was proposed to model defense against attacks in honeypot-enabled networks. In this game, the attacker may try to deceive the defender by employing different types of attacks, ranging from suspicious to seemingly normal activity, while the defender in turn can make use of honeypots as a deception tool to trap the attacker.…”
Section: Introductionmentioning
confidence: 99%