Next Article in Journal
Communication Protocols of an Industrial Internet of Things Environment: A Comparative Study
Previous Article in Journal
A Cache Placement Strategy with Energy Consumption Optimization in Information-Centric Networking
Article Menu
Issue 3 (March) cover image

Export Article

Open AccessArticle
Future Internet 2019, 11(3), 65; https://doi.org/10.3390/fi11030065

A Game-Theoretic Analysis for Distributed Honeypots

College of Computer and Communication Engineering, China University of Petroleum, Qingdao 266580, China
*
Author to whom correspondence should be addressed.
Received: 22 December 2018 / Revised: 28 January 2019 / Accepted: 14 February 2019 / Published: 5 March 2019
(This article belongs to the Section Smart System infrastructures and Cybersecurity)
  |  
PDF [1867 KB, uploaded 2 April 2019]
  |  

Abstract

A honeypot is a decoy tool for luring an attacker and interacting with it, further consuming its resources. Due to its fake property, a honeypot can be recognized by the adversary and loses its value. Honeypots equipped with dynamic characteristics are capable of deceiving intruders. However, most of their dynamic properties are reflected in the system configuration, rather than the location. Dynamic honeypots are faced with the risk of being identified and avoided. In this paper, we focus on the dynamic locations of honeypots and propose a distributed honeypot scheme. By periodically changing the services, the attacker cannot distinguish the real services from honeypots, and the illegal attack flow can be recognized. We adopt game theory to illustrate the effectiveness of our system. Gambit simulations are conducted to validate our proposed scheme. The game-theoretic reasoning shows that our system comprises an innovative system defense. Further simulation results prove that the proposed scheme improves the server’s payoff and that the attacker tends to abandon launching attacks. Therefore, the proposed distributed honeypot scheme is effective for network security. View Full-Text
Keywords: game theory; honeypot; network security; proactive defense game theory; honeypot; network security; proactive defense
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Li, Y.; Shi, L.; Feng, H. A Game-Theoretic Analysis for Distributed Honeypots. Future Internet 2019, 11, 65.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Future Internet EISSN 1999-5903 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top