DocumentCode
3521541
Title
Deployment and exploitation of deceptive honeybots in social networks
Author
Quanyan Zhu ; Clark, Andrew ; Poovendran, R. ; Basar, Tamer
Author_Institution
Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL, USA
fYear
2013
fDate
10-13 Dec. 2013
Firstpage
212
Lastpage
219
Abstract
As social networking sites such as Facebook and Twitter are becoming increasingly popular, a growing number of malicious attacks, such as phishing and malware, are exploiting them. Among these attacks, social botnets have sophisticated infrastructure that leverages compromised user accounts, known as bots, to automate the creation of new social networking accounts for spamming and malware propagation. Traditional defense mechanisms are often passive and reactive to non-zero-day attacks. In this paper, we adopt a proactive approach for enhancing security in social networks by infiltrating botnets with honeybots. We propose an integrated system named SODEXO which can be interfaced with social networking sites for creating deceptive honeybots and leveraging them for gaining information from botnets. We establish a Stackelberg game framework to capture strategic interactions between honeybots and botnets, and use quantitative methods to understand the tradeoffs of honeybots for their deployment and exploitation in social networks. We design a protection and alert system that integrates both microscopic and macroscopic models of honeybots and optimally determines the security strategies for honeybots. We corroborate the proposed mechanism with extensive simulations and comparisons with passive defenses.
Keywords
computer network security; game theory; invasive software; social networking (online); unsolicited e-mail; SODEXO; Stackelberg game; alert system design; botnets; botnets infiltration; deceptive honeybots deployment; deceptive honeybots exploitation; integrated system; macroscopic model; malicious attacks; malware propagation; microscopic model; non-zero-day attacks; passive defense mechanism; proactive approach; protection system design; quantitative method; security strategy determination; social networking sites; spamming; strategic interactions; Facebook; Games; High definition video; Malware; Nickel; Twitter;
fLanguage
English
Publisher
ieee
Conference_Titel
Decision and Control (CDC), 2013 IEEE 52nd Annual Conference on
Conference_Location
Firenze
ISSN
0743-1546
Print_ISBN
978-1-4673-5714-2
Type
conf
DOI
10.1109/CDC.2013.6759884
Filename
6759884
Link To Document