Skip to main content

Bayesian Game Based Pseudo Honeypot Model in Social Networks

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10603))

Abstract

In this paper, we study applying honeypots to protect social networks against DDoS attacks. Different from previous works that study honeypots for DDoS attacks, we consider attackers are rational and know to optimize attacking strategies based on the defender’s strategy. To deal with such strategic attackers, we propose a novel pseudo honeypot game model following the Bayesian game setting. In addition, we rigorously prove the existence of Bayesian Nash equilibriums (BNEs) and show how to find them in all different cases. Simulations show the BNEs achieved in the games not only reduce energy consumption but also improve efficiency of the defense.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. The State of Social Media 2011: Social is the new normal (2011). http://www.briansolis.com/2011/10/state-of-social-media-2011/

  2. Facebook Statistics. http://www.statisticbrain.com/facebook-statistics/

  3. Wang, K., Yu, J., Liu, X., Guo, S.: A pre-authentication approach to proxy re-encryption in big data context. IEEE Trans. Big Data PP(99), 1 (2017)

    Google Scholar 

  4. Jin, T., Yu, C., Yong, H., Wei, S.: SIP flooding attack detection with a multi-dimensional sketch design. IEEE Trans. Dependable Secure Comput. 11(6), 582–595 (2014)

    Article  Google Scholar 

  5. Du, M., Wang, K., Liu, X., Guo, S., Zhang, Y.: A differential privacy-based query model for sustainable fog data centers. IEEE Trans. Sustain. Comput. PP(99), 1 (2017)

    Google Scholar 

  6. Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against DDoS flooding attacks. IEEE Commun. Surveys Tuts. 15(4), 2046–2069 (2013)

    Article  Google Scholar 

  7. Wang, K., Du, M., Yang, D., Zhu, C., Shen, J., Zhang, Y.: Game theory-based active defense for intrusion detection in cyber-physical embedded systems. ACM Trans. Embedded Comput. Syst. 16(1), 18 (2016)

    Article  Google Scholar 

  8. How Much Does a DDoS Attack Cost.html. http://www.internetnews.com/security/article.php/3933046/

  9. Wang, K., Wu, M.: Nash equilibrium of node cooperation based on metamodel for MANETs. J. Inf. Sci. Eng. 28(2), 317–333 (2012)

    MathSciNet  Google Scholar 

  10. Peng, T., Leckie, C., Ramamohanarao, K.: Survey of networkbased defense mechanisms countering the DoS and DDoS problems. ACM Comput. Surv. 39(1), 60–67 (2007)

    Article  Google Scholar 

  11. Wang, K., Zhuo, L., Shao, Y., Yue, D., Tsang, K.F.: Toward distributed data processing on intelligent leakpoints prediction in petrochemical industries. IEEE Trans. Ind. Inf. 12(6), 2091–2102 (2016)

    Article  Google Scholar 

  12. Chun-Jen, C., Khatkar, P., Tianyi, X., Jeongkeun, L., Dijiang, H.: NICE: network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans. Dependable Secure Comput. 10(4), 198–211 (2013)

    Article  Google Scholar 

  13. Jiang, H., Wang, K., Wang, Y., Gao, M., Zhang, Y.: Energy big data: a survey. IEEE Access 4, 3844–3861 (2016)

    Article  Google Scholar 

  14. Wang, K., Wang, Y., Sun, Y., Guo, S., Wu, J.: Green industrial Internet of Things architecture: an energy-efficient perspective. IEEE Commun. Mag. 54(12), 48–54 (2016)

    Article  Google Scholar 

  15. Beham, M., Vlad, M., Reiser, H.P.: Intrusion detection and honeypots in nested virtualization environments. In: Proceeding of IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 1–6 (2016)

    Google Scholar 

  16. Wang, K., Yuan, L., Mizayaki, T., Sun, Y., Guo, S.: Anti-eavesdropping with selfish jamming in wireless networks: a bertrand game approach. IEEE Trans. Veh. Technol. (2016). doi:10.1109/TVT.2016.2639827

    Google Scholar 

  17. Luo, J., Yang, X., Wang, J., Xu, J., Sun, J., Long, K.: On a mathematical model for low-rate shrew DDoS. IEEE Trans. Inf. Forensics Secur. 9(7), 1069–1083 (2014)

    Article  Google Scholar 

  18. Wang, K., Ouyang, Z., Krishnan, R., Shu, L., He, L.: A game theory based energy management system using price elasticity for smart grids. IEEE Trans. Ind. Inf. 11(6), 1607–1616 (2015)

    Article  Google Scholar 

  19. Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proceeding of Network and Distributed Systems Security, pp. 191–206 (2003)

    Google Scholar 

  20. Wang, K., Du, M., Sun, Y., Vinel, A., Zhang, Y.: Attack detection and distributed forensics in M2M networks. IEEE Netw. 30(6), 49–55 (2016)

    Article  Google Scholar 

  21. Zhan, Z., Xu, M., Xu, S.: Characterizing honeypot-captured cyber attacks: Statistical framework and case study. IEEE Trans. Inf. Forensics Security 8(11), 1775–1789 (2013)

    Article  Google Scholar 

  22. Wang, K., Du, M., Maharjan, S., Sun, Y.: Strategic honeypot game model for distributed denial of service attacks in the smart grid. IEEE Trans. Smart Grid (2017). doi:10.1109/TSG.2017.2670144

    Google Scholar 

Download references

Acknowledgments

This work is supported by NSFC (61572262, 61533010, 61373135, 61571233, 61532013); National China 973 Project (2015CB352401); the NSF of Jiangsu Province (BK20141427); NUPT (NY214097); The Qinlan Project of Jiangsu Province.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miao Du .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Du, M., Li, Y., Lu, Q., Wang, K. (2017). Bayesian Game Based Pseudo Honeypot Model in Social Networks. In: Sun, X., Chao, HC., You, X., Bertino, E. (eds) Cloud Computing and Security. ICCCS 2017. Lecture Notes in Computer Science(), vol 10603. Springer, Cham. https://doi.org/10.1007/978-3-319-68542-7_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-68542-7_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-68541-0

  • Online ISBN: 978-3-319-68542-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics