Performance evaluation of deception system for deceiving cyber adversaries in adaptive virtualized wireless networks

Danda B. Rawat, Naveen Sapavath, Min Song

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

5 Scopus citations

Abstract

Malicious actions by cyber-adversaries are growing exponentially which makes it difficult to combat cyber-attacks for emerging networked cyber physical systems (CPS) and Internet of Things (IoT). Furthermore, wireless networks - major communication media for most emerging CPS and IoT applications - are highly vulnerable to cyber attacks because of their nature of open communications. In this paper, we evaluate the performance of the cyber deception system to combat cyber adversaries in virtualized wireless networking framework where software defined network (SDN) controller creates mobile virtual network operators (MVNOs) and continuously senses the network, observes the connections and creates deception MVNO to direct cyber adversaries. The deception MVNO can be used to learn about cyber adversaries in terms of their capabilities, intent and how much damage they can do in the system and so on. Thus, the cyber deception can help secure legitimate users from cyber adversaries. Performance of the proposed approach is evaluated with results obtained from Monte Carlo simulations.

Original languageEnglish
Title of host publicationProceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019
Pages401-406
Number of pages6
ISBN (Electronic)9781450367332
DOIs
StatePublished - 7 Nov 2019
Event4th ACM/IEEE Symposium on Edge Computing, SEC 2019 - Arlington, United States
Duration: 7 Nov 20199 Nov 2019

Publication series

NameProceedings of the 4th ACM/IEEE Symposium on Edge Computing, SEC 2019

Conference

Conference4th ACM/IEEE Symposium on Edge Computing, SEC 2019
Country/TerritoryUnited States
CityArlington
Period7/11/199/11/19

Keywords

  • Cyber adversaries in virtualized wireless networks
  • Cyber deception in wireless networks
  • Deception MVNO
  • Wireless virtualization security

Fingerprint

Dive into the research topics of 'Performance evaluation of deception system for deceiving cyber adversaries in adaptive virtualized wireless networks'. Together they form a unique fingerprint.

Cite this