TY - JOUR
T1 - A Probabilistic Logic of Cyber Deception
AU - Jajodia, Sushil
AU - Park, Noseong
AU - Pierazzi, Fabio
AU - Pugliese, Andrea
AU - Serra, Edoardo
AU - Simari, Gerardo I.
AU - Subrahmanian, V. S.
N1 - Publisher Copyright:
© 2005-2012 IEEE.
PY - 2017/11/1
Y1 - 2017/11/1
N2 - Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they may exploit as they traverse the network. In this paper, we propose that the system generates a mix of true and false answers in response to scan requests. If the attacker believes that all scan results are true, then he will be on a wrong path. If he believes some scan results are faked, he would have to expend time and effort in order to separate fact from fiction. We propose a probabilistic logic of deception and show that various computations are NP-hard. We model the attacker’s state and show the effects of faked scan results. We then show how the defender can generate fake scan results in different states that minimize the damage the attacker can produce. We develop a Naive-PLD algorithm and a Fast-PLD heuristic algorithm for the defender to use and show experimentally that the latter performs well in a fraction of the run time of the former. We ran detailed experiments to assess the performance of these algorithms and further show that by running Fast-PLD off-line and storing the results, we can very efficiently answer run-time scan requests.
AB - Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they may exploit as they traverse the network. In this paper, we propose that the system generates a mix of true and false answers in response to scan requests. If the attacker believes that all scan results are true, then he will be on a wrong path. If he believes some scan results are faked, he would have to expend time and effort in order to separate fact from fiction. We propose a probabilistic logic of deception and show that various computations are NP-hard. We model the attacker’s state and show the effects of faked scan results. We then show how the defender can generate fake scan results in different states that minimize the damage the attacker can produce. We develop a Naive-PLD algorithm and a Fast-PLD heuristic algorithm for the defender to use and show experimentally that the latter performs well in a fraction of the run time of the former. We ran detailed experiments to assess the performance of these algorithms and further show that by running Fast-PLD off-line and storing the results, we can very efficiently answer run-time scan requests.
KW - computational and artificial intelligence
KW - computer networks
KW - computer security
KW - logic-probabilistic logic
KW - network security
UR - https://scholarworks.boisestate.edu/cs_facpubs/106
UR - https://doi.org/10.1109/TIFS.2017.2710945
UR - http://www.scopus.com/inward/record.url?scp=85029311206&partnerID=8YFLogxK
U2 - 10.1109/TIFS.2017.2710945
DO - 10.1109/TIFS.2017.2710945
M3 - Article
SN - 1556-6013
VL - 12
SP - 2532
EP - 2544
JO - IEEE Transactions on Information Forensics and Security
JF - IEEE Transactions on Information Forensics and Security
IS - 11
M1 - 7937934
ER -