TY - GEN
T1 - Performance evaluation of deception system for deceiving cyber adversaries in adaptive virtualized wireless networks
AU - Rawat, Danda B.
AU - Sapavath, Naveen
AU - Song, Min
N1 - Publisher Copyright:
© 2019 Association for Computing Machinery.
PY - 2019/11/7
Y1 - 2019/11/7
N2 - Malicious actions by cyber-adversaries are growing exponentially which makes it difficult to combat cyber-attacks for emerging networked cyber physical systems (CPS) and Internet of Things (IoT). Furthermore, wireless networks - major communication media for most emerging CPS and IoT applications - are highly vulnerable to cyber attacks because of their nature of open communications. In this paper, we evaluate the performance of the cyber deception system to combat cyber adversaries in virtualized wireless networking framework where software defined network (SDN) controller creates mobile virtual network operators (MVNOs) and continuously senses the network, observes the connections and creates deception MVNO to direct cyber adversaries. The deception MVNO can be used to learn about cyber adversaries in terms of their capabilities, intent and how much damage they can do in the system and so on. Thus, the cyber deception can help secure legitimate users from cyber adversaries. Performance of the proposed approach is evaluated with results obtained from Monte Carlo simulations.
AB - Malicious actions by cyber-adversaries are growing exponentially which makes it difficult to combat cyber-attacks for emerging networked cyber physical systems (CPS) and Internet of Things (IoT). Furthermore, wireless networks - major communication media for most emerging CPS and IoT applications - are highly vulnerable to cyber attacks because of their nature of open communications. In this paper, we evaluate the performance of the cyber deception system to combat cyber adversaries in virtualized wireless networking framework where software defined network (SDN) controller creates mobile virtual network operators (MVNOs) and continuously senses the network, observes the connections and creates deception MVNO to direct cyber adversaries. The deception MVNO can be used to learn about cyber adversaries in terms of their capabilities, intent and how much damage they can do in the system and so on. Thus, the cyber deception can help secure legitimate users from cyber adversaries. Performance of the proposed approach is evaluated with results obtained from Monte Carlo simulations.
KW - Cyber adversaries in virtualized wireless networks
KW - Cyber deception in wireless networks
KW - Deception MVNO
KW - Wireless virtualization security
UR - http://www.scopus.com/inward/record.url?scp=85076260730&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85076260730&partnerID=8YFLogxK
U2 - 10.1145/3318216.3363377
DO - 10.1145/3318216.3363377
M3 - Conference contribution
AN - SCOPUS:85076260730
T3 - Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019
SP - 401
EP - 406
BT - Proceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019
T2 - 4th ACM/IEEE Symposium on Edge Computing, SEC 2019
Y2 - 7 November 2019 through 9 November 2019
ER -