Title :
Deployment and exploitation of deceptive honeybots in social networks
Author :
Quanyan Zhu ; Clark, Andrew ; Poovendran, R. ; Basar, Tamer
Author_Institution :
Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
Abstract :
As social networking sites such as Facebook and Twitter are becoming increasingly popular, a growing number of malicious attacks, such as phishing and malware, are exploiting them. Among these attacks, social botnets have sophisticated infrastructure that leverages compromised user accounts, known as bots, to automate the creation of new social networking accounts for spamming and malware propagation. Traditional defense mechanisms are often passive and reactive to non-zero-day attacks. In this paper, we adopt a proactive approach for enhancing security in social networks by infiltrating botnets with honeybots. We propose an integrated system named SODEXO which can be interfaced with social networking sites for creating deceptive honeybots and leveraging them for gaining information from botnets. We establish a Stackelberg game framework to capture strategic interactions between honeybots and botnets, and use quantitative methods to understand the tradeoffs of honeybots for their deployment and exploitation in social networks. We design a protection and alert system that integrates both microscopic and macroscopic models of honeybots and optimally determines the security strategies for honeybots. We corroborate the proposed mechanism with extensive simulations and comparisons with passive defenses.
Keywords :
computer network security; game theory; invasive software; social networking (online); unsolicited e-mail; SODEXO; Stackelberg game; alert system design; botnets; botnets infiltration; deceptive honeybots deployment; deceptive honeybots exploitation; integrated system; macroscopic model; malicious attacks; malware propagation; microscopic model; non-zero-day attacks; passive defense mechanism; proactive approach; protection system design; quantitative method; security strategy determination; social networking sites; spamming; strategic interactions; Facebook; Games; High definition video; Malware; Nickel; Twitter;
Conference_Titel :
Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on
Conference_Location :
Firenze
Print_ISBN :
978-1-4673-5714-2
DOI :
10.1109/CDC.2013.6759884