TY - JOUR
T1 - Hybrid Adversarial Defense: Merging Honeypots and Traditional Security Methods
T2 - Merging honeypots and traditional security methods1
AU - Chakraborty, Tanmoy
AU - Jajodia, Sushil
AU - Park, Noseong
AU - Pugliese, Andrea
AU - Serra, Edoardo
AU - Subrahmanian, V. S.
N1 - Publisher Copyright:
© 2018 - IOS Press and the authors.
PY - 2018/8/9
Y1 - 2018/8/9
N2 - Most past work on honeypots has made two assumptions: (i) they assume that the only defensive measure used is a honeypot mechanism, and (ii) they do not consider both rational and subrational adversaries and do not reason with an adversary model when placing honeypots. However, real-world system security officers use a mix of instruments such as traditional defenses (e.g. firewalls, intrusion detection systems), and honeypots form only one portion of the strategy. Moreover, the placement of traditional defenses and honeypots cannot be done independently. In this paper, we consider a Stackelberg-style game situation where the defender models the attacker and uses that model to identify the best placement of traditional defenses and honeypots. We provide a formal definition of undamaged asset value (i.e. the value that is not compromised by the attacker) under a given defensive strategy and show that the problem of finding the best placement so as to maximize undamaged asset value is NP-hard. We propose a greedy algorithm and show via experiments, both on real enterprise networks and on ones generated by the well-known network simulation tool NS-2, that our algorithm quickly computes near optimal placements. As such, our method is both practical and effective.
AB - Most past work on honeypots has made two assumptions: (i) they assume that the only defensive measure used is a honeypot mechanism, and (ii) they do not consider both rational and subrational adversaries and do not reason with an adversary model when placing honeypots. However, real-world system security officers use a mix of instruments such as traditional defenses (e.g. firewalls, intrusion detection systems), and honeypots form only one portion of the strategy. Moreover, the placement of traditional defenses and honeypots cannot be done independently. In this paper, we consider a Stackelberg-style game situation where the defender models the attacker and uses that model to identify the best placement of traditional defenses and honeypots. We provide a formal definition of undamaged asset value (i.e. the value that is not compromised by the attacker) under a given defensive strategy and show that the problem of finding the best placement so as to maximize undamaged asset value is NP-hard. We propose a greedy algorithm and show via experiments, both on real enterprise networks and on ones generated by the well-known network simulation tool NS-2, that our algorithm quickly computes near optimal placements. As such, our method is both practical and effective.
KW - adversarial defense of enterprise systems
KW - game theoretic models
UR - https://scholarworks.boisestate.edu/cs_facpubs/155
UR - https://doi.org/10.3233/JCS-171094
UR - http://www.scopus.com/inward/record.url?scp=85051961318&partnerID=8YFLogxK
U2 - 10.3233/JCS-171094
DO - 10.3233/JCS-171094
M3 - Article
VL - 26
SP - 615
EP - 645
JO - Journal of Computer Security
JF - Journal of Computer Security
IS - 5
ER -