Abstract
In this paper, we study applying honeypots to protect social networks against DDoS attacks. Different from previous works that study honeypots for DDoS attacks, we consider attackers are rational and know to optimize attacking strategies based on the defender’s strategy. To deal with such strategic attackers, we propose a novel pseudo honeypot game model following the Bayesian game setting. In addition, we rigorously prove the existence of Bayesian Nash equilibriums (BNEs) and show how to find them in all different cases. Simulations show the BNEs achieved in the games not only reduce energy consumption but also improve efficiency of the defense.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
The State of Social Media 2011: Social is the new normal (2011). http://www.briansolis.com/2011/10/state-of-social-media-2011/
Facebook Statistics. http://www.statisticbrain.com/facebook-statistics/
Wang, K., Yu, J., Liu, X., Guo, S.: A pre-authentication approach to proxy re-encryption in big data context. IEEE Trans. Big Data PP(99), 1 (2017)
Jin, T., Yu, C., Yong, H., Wei, S.: SIP flooding attack detection with a multi-dimensional sketch design. IEEE Trans. Dependable Secure Comput. 11(6), 582–595 (2014)
Du, M., Wang, K., Liu, X., Guo, S., Zhang, Y.: A differential privacy-based query model for sustainable fog data centers. IEEE Trans. Sustain. Comput. PP(99), 1 (2017)
Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against DDoS flooding attacks. IEEE Commun. Surveys Tuts. 15(4), 2046–2069 (2013)
Wang, K., Du, M., Yang, D., Zhu, C., Shen, J., Zhang, Y.: Game theory-based active defense for intrusion detection in cyber-physical embedded systems. ACM Trans. Embedded Comput. Syst. 16(1), 18 (2016)
How Much Does a DDoS Attack Cost.html. http://www.internetnews.com/security/article.php/3933046/
Wang, K., Wu, M.: Nash equilibrium of node cooperation based on metamodel for MANETs. J. Inf. Sci. Eng. 28(2), 317–333 (2012)
Peng, T., Leckie, C., Ramamohanarao, K.: Survey of networkbased defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 39(1), 60–67 (2007)
Wang, K., Zhuo, L., Shao, Y., Yue, D., Tsang, K.F.: Toward distributed data processing on intelligent leakpoints prediction in petrochemical industries. IEEE Trans. Ind. Inf. 12(6), 2091–2102 (2016)
Chun-Jen, C., Khatkar, P., Tianyi, X., Jeongkeun, L., Dijiang, H.: NICE: network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans. Dependable Secure Comput. 10(4), 198–211 (2013)
Jiang, H., Wang, K., Wang, Y., Gao, M., Zhang, Y.: Energy big data: a survey. IEEE Access 4, 3844–3861 (2016)
Wang, K., Wang, Y., Sun, Y., Guo, S., Wu, J.: Green industrial Internet of Things architecture: an energy-efficient perspective. IEEE Commun. Mag. 54(12), 48–54 (2016)
Beham, M., Vlad, M., Reiser, H.P.: Intrusion detection and honeypots in nested virtualization environments. In: Proceeding of IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 1–6 (2016)
Wang, K., Yuan, L., Mizayaki, T., Sun, Y., Guo, S.: Anti-eavesdropping with selfish jamming in wireless networks: a bertrand game approach. IEEE Trans. Veh. Technol. (2016). doi:10.1109/TVT.2016.2639827
Luo, J., Yang, X., Wang, J., Xu, J., Sun, J., Long, K.: On a mathematical model for low-rate shrew DDoS. IEEE Trans. Inf. Forensics Secur. 9(7), 1069–1083 (2014)
Wang, K., Ouyang, Z., Krishnan, R., Shu, L., He, L.: A game theory based energy management system using price elasticity for smart grids. IEEE Trans. Ind. Inf. 11(6), 1607–1616 (2015)
Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proceeding of Network and Distributed Systems Security, pp. 191–206 (2003)
Wang, K., Du, M., Sun, Y., Vinel, A., Zhang, Y.: Attack detection and distributed forensics in M2M networks. IEEE Netw. 30(6), 49–55 (2016)
Zhan, Z., Xu, M., Xu, S.: Characterizing honeypot-captured cyber attacks: Statistical framework and case study. IEEE Trans. Inf. Forensics Security 8(11), 1775–1789 (2013)
Wang, K., Du, M., Maharjan, S., Sun, Y.: Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid (2017). doi:10.1109/TSG.2017.2670144
Acknowledgments
This work is supported by NSFC (61572262, 61533010, 61373135, 61571233, 61532013); National China 973 Project (2015CB352401); the NSF of Jiangsu Province (BK20141427); NUPT (NY214097); The Qinlan Project of Jiangsu Province.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Du, M., Li, Y., Lu, Q., Wang, K. (2017). Bayesian Game Based Pseudo Honeypot Model in Social Networks. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-68542-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-68541-0
Online ISBN: 978-3-319-68542-7
eBook Packages: Computer ScienceComputer Science (R0)