2022
DOI: 10.3390/electronics11101623
|View full text |Cite
|
Sign up to set email alerts
|

IoDM: A Study on a IoT-Based Organizational Deception Modeling with Adaptive General-Sum Game Competition

Abstract: Moving target defense (MTD) and decoy strategies, measures of active defense, were introduced to secure both the proactive security and reactive adaptability of internet-of-things (IoT) networks that have been explosively applied to various industries without any strong security measures and to mitigate the side effects of threats. However, the existing MTD and decoy strategies are limited to avoiding the attacker’s reconnaissance and initial intrusion attempts through simple structural mutations or inducing t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 68 publications
(94 reference statements)
0
1
0
Order By: Relevance
“…In addition, the formal feedback flow of the mutation scheme was also normalized to suit the drone-type MTD designed to meet the continuity and compatibility of tactical drones operated on the battlefield. [38] Wired/mixed net Game X X Hong et al [41,42] Wired/mixed net Graph & metric O X Zhou et al [43] Wired net Game & tree X X Rahim et al [44] Wired net Formalism X X Ballot et al [18] Wired net Formalism Seo et al [50] Wireless This study extended the scope of adaptation of mutation principles as 'what-to-move,' 'when-tomove,' 'how-to-move' and the scope of a configuration of the MTD mechanisms selected to provide high attenuation of the spatial-temporal asymmetry of attacker dominance over the potential attack surface of mission-critical systems that must be highly secure and safe to unmanned wireless embedded maneuvering platforms such as tactical drones. Based on a Pareto solver that considers both cyberagility and resilience, to reason and prove the adaptive deception performance of the proposed dronetype MTD based on a formal method, this study integrated and performed a structural specification based on diversified decision trees according to PTMDP-based formalism, and verification based on zero-sum games and model checking.…”
Section: Summary Of Experimental Results and Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, the formal feedback flow of the mutation scheme was also normalized to suit the drone-type MTD designed to meet the continuity and compatibility of tactical drones operated on the battlefield. [38] Wired/mixed net Game X X Hong et al [41,42] Wired/mixed net Graph & metric O X Zhou et al [43] Wired net Game & tree X X Rahim et al [44] Wired net Formalism X X Ballot et al [18] Wired net Formalism Seo et al [50] Wireless This study extended the scope of adaptation of mutation principles as 'what-to-move,' 'when-tomove,' 'how-to-move' and the scope of a configuration of the MTD mechanisms selected to provide high attenuation of the spatial-temporal asymmetry of attacker dominance over the potential attack surface of mission-critical systems that must be highly secure and safe to unmanned wireless embedded maneuvering platforms such as tactical drones. Based on a Pareto solver that considers both cyberagility and resilience, to reason and prove the adaptive deception performance of the proposed dronetype MTD based on a formal method, this study integrated and performed a structural specification based on diversified decision trees according to PTMDP-based formalism, and verification based on zero-sum games and model checking.…”
Section: Summary Of Experimental Results and Comparisonmentioning
confidence: 99%
“…In a related followup study, Li et al [16] further amplified the hydraulic properties of the spatial-temporal attack surface that changed with MTD mutation by formalizing the Markov Stackelberg model optimized based on the average-cost semi-Markov decision process and discrete-time Markov decision process. Finally, Seo et al [38] added an adaptive cognitive disturbance scheme to the existing MTD and constructed a deceptive game considering the continuous operability of the organization by combining this with a layered social engineering decoy. Also, in this work, a general sum game-based testbed was proposed to improve the proactive defense of the IoT-based sub-farm network cluster further.…”
Section: Stackelberg Game Theoretic Literaturementioning
confidence: 99%
“…Seo et al [44], [45] added a dynamic cognitive disturbance function that the existing MTD concept was not contain, and combined it with layered social engineering decoy as an organizational open-source intelligence (OSINT) element, thereby strategizing a defensive deception process discretely optimized for real operational goals. In a follow-up study [46], IoT-based organizational deception modeling (IoDM), which represents a partial general-sum-based lightweight deception modeling designed to protect Internet-of-Things (IoT)-based organizational networks built by domain, was presented.…”
Section: Bayesian Stackelberg Game Theoretic Mtdmentioning
confidence: 99%
“…In addition, they did not adaptively optimize the MTD strategies to fit the unique characteristics of the target network or organizational environment, or consider hierarchical state-transition couplings with other deception elements in detail. Seo et al [44], [45], [46] attempted to mitigate these limitations by additionally selecting the unique organizational OSINT elements as the primary mutation set groups of MTD while constructing a virtualized sandbox container-based social engineering decoy, thereby formalizing the game logic framework combined with the MTD sequence.…”
Section: E Comparative Analysis By Previous Studies For Proposed Modelmentioning
confidence: 99%
“…One possible feature involved in building an IoT infrastructure is an IoT system of groups of identical or similar technical characteristic devices. If a specified device has a vulnerability, such homogeneity multiplies its impact [3][4][5].…”
Section: Introduction 1motivationmentioning
confidence: 99%