Abstract

Increasingly, more administrators (defenders) are using defense strategies with deception such as honeypots to improve the IoT network security in response to attacks. Using game theory, the signaling game is leveraged to describe the confrontation between attacks and defenses. However, the traditional approach focuses only on the defender; the analysis from the attacker side is ignored. Moreover, insufficient analysis has been conducted on the optimal defense strategy with deception when the model is established with the signaling game. In our work, the signaling game model is extended to a novel two-way signaling game model to describe the game from the perspectives of both the defender and the attacker. First, the improved model is formally defined, and an algorithm is proposed for identifying the refined Bayesian equilibrium. Then, according to the calculated benefits, optimal strategies choice for both the attacker and the defender in the game are analyzed. Last, a simulation is conducted to evaluate the performance of the proposed model and to demonstrate that the defense strategy with deception is optimal for the defender.

1. Introduction

IoT networks and devices are highly vulnerable to sophisticated cyber-attacks. Despite the widespread deployment of security monitoring tools, which include firewalls and intrusion detection systems (IDSs), attackers can infiltrate target IoT devices by leveraging multiple attack vectors [1].

Recently, honeypot-enabled deceptive security mechanisms were introduced as an emerging proactive cyber defense strategy for confusing or misleading attackers and showed significant advantages over traditional security techniques [2]. For attackers, deceptive behaviors of defenders increase the uncertainty of the target to be compromised [3]. Attackers must spend additional resources (e.g., time and money) to deal with the uncertainty via reconnaissance and to develop situational awareness. In addition, deceptive behaviors prevent attackers from launching efficient custom attacks. For example, by collecting an attacker’s information when he is compromising a target device that is disguised by honeypots, the defender can use the learned knowledge to enhance the IoT network security [4]. As a result, deception by providing seemingly convincing yet misleading information to deceive attackers has become a major defense mechanism. With the wide utilization of deception, the security status of organizations has been substantially improved. When attackers are following the seven phases of the cyber kill chain [5] in launching an attack, deception approaches can be performed effectively in disrupting each stage of the cyber kill chain, as illustrated in Figure 1.

The contributions of the paper are the following.

(1) A two-way signaling game model based on the signaling game is formally defined to describe the confrontation from the perspectives of both the defender and the attacker. (2) With the two-way signaling game model, an algorithm is defined to identify the refined Bayesian equilibrium in the game. (3) With the deception strategy introduced, the optimal strategies choice for both the attacker and the defender in the game is analyzed.

In previous work [6], due to a lack of clarity regarding the concept of deception, deploying honeypots to detect an attacker and to obtain information on the attacker’s intentions is the primary deception mode for the defender to use. For instance, Rowe et al. [7] showed how to decrease the number of attacks to which a network is subjected by utilizing fake honeypots, namely, by disguising normal systems as honeypots. Garg and Grosu [8] used a honeynet system to characterize deception, where defenders may have the choice to conceal a regular host as a honeypot (or inversely) in response to the attackers’ probe. Seamus et al. [9] created a honeypot that simulates a ZigBee gateway to assess the presence of the ZigBee attack intelligence on a SSH attack vector in Wireless Sensor Networks (WSNs).

Until recent years, as deception became a powerful tool for protecting IoT networks and devices against attackers [10], game theory was introduced into the field of cybersecurity to model the interaction between defender and attacker and to identify the optimal defense strategies for both players. Cohen [11] comprehensively discussed deception as a technique for protecting information systems and concluded that deception has a positive effect for the defenders and a negative effect for the attackers. Carroll and Grosu [12] modeled the way deception affects the attack-defense interactions based on a game in which the players (defenders and attackers) have incomplete knowledge of each other. Pawlick and Zhu [13] extended the signaling game by assuming that the adversary can obtain evidence of the true state of the system, and they concluded that the effectiveness of deceptive defenders sometimes increases if an adversary develops the ability to detect deception. Duan et al. [14] proposed an energy-aware trust derivation scheme using the game theoretic approach to manage overhead while maintaining adequate security of WSNs. Fugate and Ferguson [15] discussed techniques for combining artificial intelligence algorithms with game theory models to estimate hidden states of the attacker using feedback through payoffs to learn how to optimally defend the system using cyber deception. Additional works are listed in Table 1.

As discussed above, in contrast to the previous focus on the analysis of the defender, our work will describe the process from not only the perspective of the defender but also that of the attacker.

3. An Improved Signaling Game Model

3.1. Analysis of the Novel Attack–And–Defense Signaling Game

According to [2224], the information that is released by the defender actively or the information that is leaked via defensive behavior passively is an important decision-making basis for the attacker. Such information is referred to as the signal that is sent by the defender, and the defense signal can affect the behavior of the attacker by changing the benefits to both the attacker and the defender. Furthermore, we believe that the information that is released by the attacker and observed by the defender will also affect the defense decision and change the final attack-and-defense benefits. We construct an attack-and-defense behavior interaction model with incomplete information. According to signaling game theory, we analyze the dynamic game process and the signal mechanism from the perspectives of both attack and defense, and we investigate the influence of defense signals on the game equilibrium and strategy choice for both the attacker and the defender. We describe this process as a novel attack-and-defense signaling game that is defined as a two-way signaling game model, as illustrated in Figure 2.

The defender is defined as the leader of the signaling game, and the attacker is the follower when analyzing the forward signal transmission. The roles of the attacker and the defender will be exchanged when analyzing the reverse signal transmission. By constructing the attack–and–defense game process in both the forward and reverse directions, the influences of two examples on the defense strategy are analyzed: (1) in the forward phase, ① a defender mixes a defensive strategy with a (or no) deception strategy to deter, deceive, and induce the attacker and sends a defensive signal; ② the attacker forms an initial belief regarding the defender type by collecting reconnaissance information in advance and public information from the defender. The attack strategy is selected according to the calculation of the Bayesian posterior probability for the defender type; and ③ the defender selects the optimal defense strategy for implementing security defense. (2) In the reverse phase, ① the attacker sends an attack signal while attacking; ② the defender forms a belief regarding the attacker. Under the action of the attack signal, the defender calculates the Bayesian posterior probability of the attacker type and corrects the defense strategy accordingly; and ③ the attacker corrects the current optimal attack strategy.

For convenience, we analyze the forward signaling game process and the reverse process separately; however, logically, these two processes are conducted simultaneously. Therefore, the strategy choice that is made by the defender is simultaneously affected by these two processes.

3.2. Formal Definition of the Two-Way Signaling Game Model

Definition 1. The two-way signaling game model for defense strategy selection with deception can be represented by a nine-tuple , in which
denotes the player set for a two-play game, where denotes the set for the defender and the set for the attacker.
denotes the type set for the defender and the attacker. The type of defender is the private information, which determined by the defensive action that is taken; the type of attacker is the private information of the attacker, which is determined by the attack action that is taken.
denotes the signal set for the defender and the attacker. denotes that the defender selects and releases the signal according to the set signal release mechanism. For ease of representation, the signal name is consistent with the defender type name. The defense signal and the defender type are not necessarily consistent due to the objective of deceiving and inducing the attacker. Similarly, denotes the attack signal that is sent by the attacker, and the signal name is the same as the attacker type name.
denotes the strategy set for the defender and the attacker, where and denote the defense strategy and the attack strategy, respectively.
is the belief set of the attacker on the type of defender, where.
is the posterior probability set of the attacker on the type of defender, where, denotes the posterior probability of the type of defender, which follows the Bayesian rule, after the attacker observes the defensive signal .
is the belief set of the defender on the type of attacker, where .
is the posterior probability set of the defender on the type of attacker, where denotes the posterior probability of the type of attacker, which follows the Bayesian rule, after the defender observes the defensive signal .
denotes the expected utility set of the defender and the attacker, whose value is determined by the strategies that are chosen by all players. The corresponding utility functions will be discussed in the next section.

3.3. Refined Bayesian Equilibrium Solution and the Optimal Defense Strategy Choice

According to Definition 1, this section extends the refined Bayesian equilibrium to the two-way signaling game model based on the definition of the refined Bayesian equilibrium [25] and proposes a refined Bayesian equilibrium algorithm for the two-way signaling game. Instances in the forward direction and in the reverse direction for the two-way signaling game model were constructed to show the details.

Definition 2. The equilibrium in a two-way signaling game model for defense strategy choice with deception is a refined Bayesian equilibrium if the following requirements are satisfied: (I)(II)(III) is the posterior probability that is calculated by the signal receiver according to the Bayesian rule based on the prior probability , signal , and the signal sender’s optimal strategy .

In (I), denotes the optimal action that is adopted by the signal receiver after obtaining the posterior probability of the type to which the signal sender belongs; denotes the utility function of the signal receiver, which is the expected utility function of attacker in the forward direction and the expected utility function of the defender in the reverse direction; and denotes the type set for the defender and the attacker, where in the forward direction and in the reverse direction.

In (II), denotes the optimal strategy that is selected by the signal sender after predicting the optimal action of the signal receiver; denotes the utility function of the signal sender, which is in the forward direction, and in the reverse direction.

In (III), indicates the posterior probability calculated by signal receiver according to the signal sent by the signal sender followed by the Bayesian rule, which is in the forward direction and in the reverse direction.

3.4. Method of Refined Bayesian Equilibrium in the Two-Way Signaling Game Model

The steps are as follows: (1)Construct the posterior inference of various information sets on the signaling game tree(2)Calculate the optimal strategy for the signal receiver according to the posterior inference

When observing the signal, the signal receiver will choose optimal strategy according to for the type of the sender to maximize the expected utility , namely, the signal receiver will identify his optimal strategy by calculating. (3)Calculate the optimal strategy for the signal sender according to the posterior inference

The signal sender foresees that the signal receiver will select the optimal strategy based on observations of the signal that is released by him and chooses the strategy that maximizes the expected utility , namely, the signal sender identifies his optimal strategy based on the posterior inference by calculating . (4)Calculate the refined Bayesian equilibrium

Calculate via the Bayesian rule according to from (2), from (3), and the belief . If and are not in conflict, then the refined Bayesian equilibrium solution is .

The following two instances of the forward direction and the reverse direction of the signaling game demonstrate the process above. The defender type is denoted as , and the signal corresponds to the defender type, namely, . In addition, the defensive strategy set is, and the utility function is ; the attacker type is denoted as , with the attack strategy , and the utility function is .

3.5. Refined Bayesian Equilibrium Solution Method for the Forward Signaling Game

A game of incomplete information can be transformed into a game of imperfect information by adding a hypothetical player, namely, nature (denoted by C here), and by conditioning the payoffs on Nature’s unknown moves. The nature player moves first by randomly choosing the defender type with the prior probability distribution over all defender types. In the forward direction, nature assigns type with probability and type with . Once the defender has learned her type, she decides what signal or message to send to the attacker. The signal provides indirect information for the attacker about the defender type. In our example, the defender can send either signal (signaling that the defender type is ) or (signaling that the defender type is ). The defender can send signal , even in the case that her real type is , or send signal , even in the case that her real type is . The attacker revises his judgement on the defender type and takes action if observing signal and action if observing the signal , as the posterior probability for the defender type . In the game tree, indicates eight outcomes, which results in a corresponding payoff. The forward signaling game tree is presented in Figure 3.

3.6. Refined Bayesian Equilibrium Solution Method for the Reverse Signaling Game

Nature moves first by randomly choosing the attacker type with the prior probability distribution over the attacker types. The reverse signaling game tree is presented in detail in Figure 4.

According to the definition, indicates that attacker sends signal and chooses strategy according to the signal, which is denoted as ; indicates the defender’s responding action , which is denoted as ; indicates that the defender calculated as the posterior probability for the attacker type, which is denoted as ; and the existence of a refined Bayesian equilibrium is denoted as . Based on the two examples above and the algorithm in [26], the optimal strategy selection algorithm for the two-way signaling game model is presented as Algorithm 1.

Input: Model, Signal direction parameter w
Output: Optimal strategy for the defender
BEGIN
if (w =1)//forward-direction signalling game
{Initialize ();
//Initialize the type of the defender
 Initialize (,);
//Initialize the signal of the defender and the belief of the defender regarding the attacker
}
If (w =0)//reverse-direction signalling game
{Initialize ();
//Initialize the type of the attacker
 Initialize (
);
//Initialize the signal of the attacker and the belief of the attacker regarding the defender
}
Initialize (,,);
//Initialize the strategies for both players
while (&&&&)//Calculate the utility
{;
;
}
//Obtain the refined Bayesian Equilibrium
;
;
//Calculate the optimal strategy for attack and defence
Bayesian ();
//Calculate the posterior probability and apply the Bayesian rule
for the defender
Create ; //Construct the refined Bayesian equilibrium
Sort ();//descending
Output ();//output the optimal strategy for the defender
End
Algorithm 1: Optimal strategy choice algorithm description based on a two-way signaling game model.

4. Simulation Results and Analysis

4.1. Simulation Environment

To evaluate the proposed attack-and-defense signaling game model and the algorithm for optimal strategy selection, we construct the simulation environment illustrated in Figure 5.

4.2. Calculating the Utility

According to Richard [27], common vulnerability [28] and the database of attack-and-defense behaviors from MIT [29], attack strategies that are composed of basic options are listed in Table 2.

Common defense strategies with deception that are composed of basic operations are described in Table 3.

For selecting the optimal strategy more scientifically and intuitively, the most basic approach is to quantify the utilities of the strategies that are selected by the defender and the attacker. In this paper, we utilize the scheme that was proposed by Zhang and Li [30] to calculate the expected utility functions of the defenders and the attackers as follows:

The notations that are used in equations (1) and (2) are described in Table 4.

For the defender type {, }, the defense strategy is assumed to be or , and for the attacker type {, }, the attack strategy is or . Based on historical data and experience,

, , and .

To calculate the utility of the forward-direction signaling game, we set

All the utilities that are specified in Figures 6 and 7 were calculated via equations (1) and (2).

The posterior inferences can be constructed on various sets of information. Via Algorithm 1, we obtain possible equilibria in the forward direction, as presented in Table 5.

To calculate the utility of the reverse-direction signaling game, we set , , , and .

The posterior inferences that can be constructed on the two sets of information are and . Via Algorithm 1, we obtain the possible equilibria in the reverse direction, which are presented in Table 6.

The algorithm proposed, and the game simulated in the paper is compared with other approaches in Table 7. We have analyzed both directions of signal transmission in a dynamic incomplete information game, which is more in line with the actual attack-and-defense scenario, and the results can guide the defense decision much more precisely.

4.3. Result Analysis

By implementing the simulation above, we obtain the following results: (1)In the forward-signaling game model, if and do not conflict, the refined Bayesian equilibrium is a pooling equilibrium. Hence, the defender chooses a honey system and releases the honey system signal, which deceives the attacker, thereby influencing the attacker’s judgement on the defender type and on the choice of attack strategy. Thus, the defender uses the signal to demonstrate a capability that exceeds the actual capability, thereby reducing the likelihood of suffering a loss(2)In the reverse-signaling game model, the attacker moves first. He can be of type and send signal (presenting himself as an advanced attacker) or (pretending to be the primary attacker). He can also be of type and send the signal (presenting himself as the primary attacker) or (pretending to be an advanced attacker). According to Table 6, the refined Bayesian equilibrium is realized when the advanced attacker pretends to be the primary attacker and the defender chooses strategy with the deception technique. The advanced attacker deliberately presents weak attack capabilities so that the defender will reduce the level of defense. However, the choice of the deception defense strategy by the defender can be used to increase the defense utility(3)From the perspective of utility for both the defender and the attacker in a two-way signaling game, regardless of whether the attacker’s ability is low or high, the choice of the deception defense strategy would increase the payoff of the defender compared with the normal system without deception. The defense strategy with deception is the optimal strategy for the defender. Therefore, the defender would choose the deceptive strategy, namely, the normal system would be disguised as a honeypot

5. Conclusions

We model the confrontation between a defender and an attacker by utilizing signaling game theory. Additionally, we propose the concept of a two-way signaling game and propose an algorithm for identifying optimal defense strategies. Finally, we conduct an extensive simulation analysis to evaluate the performance of the proposed approaches by fortifying the attack-and-defense confrontation in a two-way signal releasing mechanism and calculating the utilities for both sides.

This paper mainly proposes a proactive defense mechanism that utilizes signal selection and release methods and does not consider other defense mechanisms. There are several limitations in our methods, one is that the expected utility functions used in equations (1) and (2) could not be extended to multistage games, and another is that the example shown in the simulation part did not consider the synchronous affect between the attacker and the defender during the game, both of which will be studied in the future work. However, the proposed two-way signaling game model is of substantial importance for subsequent research in the IoT network security. For example, with the method proposed, the defender of the IoT network could infer the optimal strategy of the attacker and take action such as improving the protection level in advance to defense attacks. In the future, we will integrate the analysis via mathematical description, implement the attack-and-defense model for multiple stage games, and explore the security defense decision-making method in IoT networks.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that there is no conflict of interest regarding the publication of this paper.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (grant no. 61602515).