Netinfo Security ›› 2023, Vol. 23 ›› Issue (11): 38-47.doi: 10.3969/j.issn.1671-1122.2023.11.005

Previous Articles     Next Articles

An Adaptive IoT SSH Honeypot Strategy Based on Game Theory Opponent Modeling

SONG Lihua, ZHANG Jinwei(), ZHANG Shaoyong   

  1. Institute of Command and Control Engineering, Army Engineering University of PLA, Nanjing 210007, China
  • Received:2023-06-08 Online:2023-11-10 Published:2023-11-10

Abstract:

The proliferation of IoT devices has led to an increasing number of attacks against the Internet of things, it’s urgent for cybersecurity personnel to use proactive defense techniques to turn reactive defense into proactive defense. The introduction of SSH (secure shell) honeypot technology allows defenders to capture learn attackers’ interaction informationacting strategy, which is of great significance for IoT security. However, traditional honeypots are easily identified and exploited by attackers because of their fixed characteristics or behavioral patterns. From the perspective of game theory, this paper established an interaction model between honeypots and attackers, and we calculated the best response strategy of the defender by useing SAC (soft actor-critic) algorithm. Simulation results show that adaptive honeypot by combining reinforcement learning and game theory can quickly find the optimal interaction strategy in a variety of scenarios, and the reinforcement learning method added to the policy network is better than the traditional reinforcement learning method based on the value network alone.

Key words: Internet of things, deception defense, honeypot, reinforcement learning, game theory

CLC Number: