Game Theoretic Model of Strategic Honeypot Allocation in Computer Networks

R Pibil, V Lisy, C Kiekintveld, B Bosansky, and M Pechoucek

In Proceedings of the Third International Conference on Decision and Game Theory for Security (GameSec 2012).

This is the author's version of the work.

Download

Abstract

A honeypot is a decoy computer system used in network security to waste the time and resources of attackers and to analyze their behaviors. While there has been significant research on how to design honeypot systems, less is known about how to use honeypots strategically in network defense. We develop game-theoretic models that provide insight into how honeypots can be used to maximal effect to deceive and delay potential attackers. Our model generalizes previous work on decep- tion games for honeypots by introducing differential values for network services and honeypot systems. We also introduce an extension that allows attackers to systematically probe multiple systems on a network to determine which ones are likely to be real systems (and not honeypots) before launching an attack. We provide linear programs for solving instances of these games, and analyze the properties of optimal solutions, leading to faster calculations. We present an empirical study of the models to better understand strategic issues related to honeypots.