Skip to main content

Online Learning Methods for Controlling Dynamic Cyber Deception Strategies

  • Chapter
  • First Online:
Adaptive Autonomous Secure Cyber Systems

Abstract

Cyber deception is an important tool for many aspects of cyber defense, including detecting and learning about attackers, as well as mitigating the effectiveness of reconnaissance and some types of attacks. To make cyber deception and even more effective tool, we need better methods to automatically reason about how to use specific deception techniques strategically, taking into account the costs and benefits, as well as how to adapt these strategies over time based on changes to the network or the threat environment. The principles of moving target defense and game theoretic models have made significant advances in this area, but are typically limited in being able to adapt to new and specific threats. Here we consider method based on online learning that are able to adapt defensive deception strategies over time based on interactions with attackers, and which can handle novel threats such as zero-day attacks. We introduce as an example a formal model of how these methods can be used to deploy honeypots for the purpose of detecting exploits, and present results from simulations using this model. We also present results from a second study with human participants showing that humans have a very difficult time learning to play against similar adaptive deception strategies. This shows the value of considering adaptive learning models as a complement to game theory for strategic cyber deception.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 179.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This work was first presented in the Artifical Intelligence for Cyber Security workshop in San Francisco, CA in 2017 [15].

  2. 2.

    Complete description of this work found in the proceedings in 41st CogSci conference [14]

  3. 3.

    This could easily be generalized to include non-binary features, but it is not necessary for our purposes.

  4. 4.

    Sections 2 and 3 are updated excerpts from separate works. Please consider these mathematical symbols found in these sections in isolation in the case of conflicting definitions.

  5. 5.

    We assume \(v_{i} > c^{a}_{i}\) and \(\sum _{i \in N} c^{d}_{i} > D\).

References

  1. Alpcan, T., Başar, T.: Network security: A decision and game-theoretic approach. Cambridge University Press (2010)

    Google Scholar 

  2. Auer, P., Cesa-Bianchi, N., Fischer, P.: Finite-time analysis of the multiarmed bandit problem. Machine learning 47(2–3), 235–256 (2002)

    Article  Google Scholar 

  3. Auer, P., Cesa-Bianchi, N., Freund, Y., Schapire, R.E.: Gambling in a rigged casino: The adversarial multi-armed bandit problem. In: Foundations of Computer Science, 1995. Proceedings., 36th Annual Symposium on, pp. 322–331. IEEE (1995)

    Google Scholar 

  4. Ben-Asher, N., Gonzalez, C.: Effects of cyber security knowledge on attack detection. Computers in Human Behavior 48, 51–61 (2015)

    Article  Google Scholar 

  5. Bilge, L., Dumitras, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM conference on Computer and communications security, pp. 833–844. ACM (2012)

    Google Scholar 

  6. Bringer, M.L., Chelmecki, C.A., Fujinoki, H.: A survey: Recent advances and future trends in honeypot research. International Journal of Computer Network and Information Security 4(10), 63 (2012)

    Article  Google Scholar 

  7. Bubeck, S., Cesa-Bianchi, N.: Regret analysis of stochastic and nonstochastic multi-armed bandit problems. arXiv preprint arXiv:1204.5721 (2012)

    Google Scholar 

  8. Buhrmester, M., Kwang, T., Gosling, S.D.: Amazon’s mechanical turk: A new source of inexpensive, yet high-quality, data? Perspectives on psychological science 6(1), 3–5 (2011)

    Article  Google Scholar 

  9. Carroll, T.E., Grosu, D.: A game theoretic investigation of deception in network security. Security and Communication Networks 4(10), 1162–1172 (2011)

    Article  Google Scholar 

  10. Du, M., Li, Y., Lu, Q., Wang, K.: Bayesian game based pseudo honeypot model in social networks. In: International Conference on Cloud Computing and Security, pp. 62–71. Springer (2017)

    Google Scholar 

  11. Frei, S., May, M., Fiedler, U., Plattner, B.: Large-scale vulnerability analysis. In: Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense, pp. 131–138. ACM (2006)

    Google Scholar 

  12. Gai, Y., Krishnamachari, B., Jain, R.: Combinatorial network optimization with unknown variables: Multi-armed bandits with linear rewards and individual observations. IEEE/ACM Transactions on Networking (TON) 20(5), 1466–1478 (2012)

    Article  Google Scholar 

  13. Garg, N., Grosu, D.: Deception in honeynets: A game-theoretic analysis. In: 2007 IEEE SMC Information Assurance and Security Workshop, pp. 107–113. IEEE (2007)

    Google Scholar 

  14. Gutierrez, M., Černý, J., Ben-Asher, N., Aharonov, E., Bošanský, B., Kiekintveld, C., Gonzalez, C.: Evaluating models of human adversarial behavior against defense algorithms in a contextual multi-armed bandit task. In: 41st Annual Meeting of the Cognitive Science Society (CogSci 2019), Montreal, QC (2019 (in press))

    Google Scholar 

  15. Gutierrez, M.P., Kiekintveld, C.: Adapting honeypot configurations to detect evolving exploits. In: Workshops at the Thirty-First AAAI Conference on Artificial Intelligence (2017)

    Google Scholar 

  16. Kiekintveld, C., Lisỳ, V., Píbil, R.: Game-theoretic foundations for the strategic use of honeypots in network security. In: Cyber Warfare, pp. 81–101. Springer (2015)

    Google Scholar 

  17. Klíma, R., Lisỳ, V., Kiekintveld, C.: Combining online learning and equilibrium computation in security games. In: International Conference on Decision and Game Theory for Security, pp. 130–149. Springer (2015)

    Google Scholar 

  18. La, Q.D., Quek, T.Q., Lee, J., Jin, S., Zhu, H.: Deceptive attack and defense game in honeypot-enabled networks for the internet of things. IEEE Internet of Things Journal 3(6), 1025–1035 (2016)

    Article  Google Scholar 

  19. Laszka, A., Vorobeychik, Y., Koutsoukos, X.D.: Optimal personalized filtering against spear-phishing attacks. In: AAAI (2015)

    Google Scholar 

  20. Luo, T., Xu, Z., Jin, X., Jia, Y., Ouyang, X.: Iotcandyjar: Towards an intelligent-interaction honeypot for iot devices. Black Hat (2017)

    Google Scholar 

  21. Mairh, A., Barik, D., Verma, K., Jena, D.: Honeypot in network security: a survey. In: Proceedings of the 2011 international conference on communication, computing & security, pp. 600–605. ACM (2011)

    Google Scholar 

  22. McQueen, M.A., McQueen, T.A., Boyer, W.F., Chaffin, M.R.: Empirical estimates and observations of 0day vulnerabilities. In: System Sciences, 2009. HICSS’09. 42nd Hawaii International Conference on, pp. 1–12. IEEE (2009)

    Google Scholar 

  23. Mell, P., Kent, K.A., Romanosky, S.: The common vulnerability scoring system (CVSS) and its applicability to federal agency systems. Citeseer (2007)

    Google Scholar 

  24. Nawrocki, M., Wählisch, M., Schmidt, T.C., Keil, C., Schönfelder, J.: A survey on honeypot software and data analysis. arXiv preprint arXiv:1608.06249 (2016)

    Google Scholar 

  25. Pauna, A., Iacob, A.C., Bica, I.: Qrassh-a self-adaptive ssh honeypot driven by q-learning. In: 2018 international conference on communications (COMM), pp. 441–446. IEEE (2018)

    Google Scholar 

  26. Píbil, R., Lisỳ, V., Kiekintveld, C., Bošanskỳ, B., Pěchouček, M.: Game theoretic model of strategic honeypot selection in computer networks. In: International Conference on Decision and Game Theory for Security, pp. 201–220. Springer (2012)

    Google Scholar 

  27. Provos, N.: Honeyd-a virtual honeypot daemon. In: 10th DFN-CERT Workshop, Hamburg, Germany, vol. 2, p. 4 (2003)

    Google Scholar 

  28. Rowe, N.C., Custy, E.J., Duong, B.T.: Defending cyberspace with fake honeypots. JOURNAL OF COMPUTERS 2(2), 25 (2007)

    Article  Google Scholar 

  29. Sagha, H., Shouraki, S.B., Khasteh, H., Dehghani, M.: Real-time ids using reinforcement learning. In: 2008 Second International Symposium on Intelligent Information Technology Application, vol. 2, pp. 593–597. IEEE (2008)

    Google Scholar 

  30. Schlenker, A., Thakoor, O., Xu, H., Fang, F., Tambe, M., Tran-Thanh, L., Vayanos, P., Vorobeychik, Y.: Deceiving cyber adversaries: A game theoretic approach. In: AAMAS (2018). http://dl.acm.org/citation.cfm?id=3237383.3237833

  31. Schlenker, A., Xu, H., Guirguis, M., Kiekintveld, C., Sinha, A., Tambe, M., Sonya, S.Y., Balderas, D., Dunstatter, N.: Don’t bury your head in warnings: A game-theoretic approach for intelligent allocation of cyber-security alerts. In: IJCAI, pp. 381–387 (2017)

    Google Scholar 

  32. Serra, E., Jajodia, S., Pugliese, A., Rullo, A., Subrahmanian, V.: Pareto-optimal adversarial defense of enterprise systems. ACM Transactions on Information and System Security (TISSEC) 17(3), 11 (2015)

    Article  Google Scholar 

  33. Servin, A., Kudenko, D.: Multi-agent reinforcement learning for intrusion detection. In: Adaptive Agents and Multi-Agent Systems III. Adaptation and Multi-Agent Learning, pp. 211–223. Springer (2005)

    Google Scholar 

  34. Servin, A., Kudenko, D.: Multi-agent reinforcement learning for intrusion detection: A case study and evaluation. In: German Conference on Multiagent System Technologies, pp. 159–170. Springer (2008)

    Google Scholar 

  35. Shi, L., Zhao, J., Jiang, L., Xing, W., Gong, J., Liu, X.: Game theoretic simulation on the mimicry honeypot. Wuhan University Journal of Natural Sciences 21(1), 69–74 (2016)

    Article  MathSciNet  Google Scholar 

  36. Spitzner, L.: Honeypots: tracking hackers, vol. 1. Addison-Wesley Reading (2003)

    Google Scholar 

  37. Sutton, R.S., Barto, A.G.: Reinforcement learning: An introduction. MIT press (2018)

    Google Scholar 

  38. Tsikerdekis, M., Zeadally, S., Schlesener, A., Sklavos, N.: Approaches for preventing honeypot detection and compromise. In: 2018 Global Information Infrastructure and Networking Symposium (GIIS), pp. 1–6. IEEE (2018)

    Google Scholar 

  39. Venkatesan, S., Albanese, M., Shah, A., Ganesan, R., Jajodia, S.: Detecting stealthy botnets in a resource-constrained environment using reinforcement learning. In: MTD@ CCS, pp. 75–85 (2017)

    Google Scholar 

  40. Wagener, G., Dulaunoy, A., Engel, T., et al.: Self adaptive high interaction honeypots driven by game theory. In: Symposium on Self-Stabilizing Systems, pp. 741–755. Springer (2009)

    Google Scholar 

  41. Wagener, G., State, R., Engel, T., Dulaunoy, A.: Adaptive and self-configurable honeypots. In: 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops, pp. 345–352. IEEE (2011)

    Google Scholar 

  42. Wang, K., Du, M., Maharjan, S., Sun, Y.: Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Transactions on Smart Grid 8(5), 2474–2482 (2017)

    Article  Google Scholar 

  43. Wang, W., Zeng, B.: A two-stage deception game for network defense. In: Decision and Game Theory for Security (2018)

    Google Scholar 

  44. Xu, X., Xie, T.: A reinforcement learning approach for host-based intrusion detection using sequences of system calls. In: International Conference on Intelligent Computing, pp. 995–1003. Springer (2005)

    Google Scholar 

Download references

Acknowledgements

The work found in Sect. 2 first appeared in the Artificial Intelligence for Cyber Security workshop held at the 31st AAAI Conference on Artificial Intelligence in San Francisco, CA in 2017 [15].

The work found in Sect. 3 is currently in press for the 41st Annual Meeting of the Cognitive Science Society (2019) to be held in Montreal, Canada at the time this was written [14]. The authors would like to thank Jakub Černý, Palvi Aggarwal, Noam Ben-Asher, Efrat Aharonov, Branislav Bošanský, Orsolya Kovacs, and Cleotilde Gonzalez for their contributions to this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Christopher Kiekintveld .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gutierrez, M., Kiekintveld, C. (2020). Online Learning Methods for Controlling Dynamic Cyber Deception Strategies. In: Jajodia, S., Cybenko, G., Subrahmanian, V., Swarup, V., Wang, C., Wellman, M. (eds) Adaptive Autonomous Secure Cyber Systems. Springer, Cham. https://doi.org/10.1007/978-3-030-33432-1_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-33432-1_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-33431-4

  • Online ISBN: 978-3-030-33432-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics