HoneyCar: A Framework to Configure HoneypotVulnerabilities on the
Internet of Vehicles
- URL: http://arxiv.org/abs/2111.02364v1
- Date: Wed, 3 Nov 2021 17:31:56 GMT
- Title: HoneyCar: A Framework to Configure HoneypotVulnerabilities on the
Internet of Vehicles
- Authors: Sakshyam Panda, Stefan Rass, Sotiris Moschoyiannis, Kaitai Liang,
George Loukas, Emmanouil Panaousis
- Abstract summary: The Internet of Vehicles (IoV) has promising socio-economic benefits but also poses new cyber-physical threats.
Data on vehicular attackers can be realistically gathered through cyber threat intelligence using systems like honeypots.
We present HoneyCar, a novel decision support framework for honeypot deception.
- Score: 5.248912296890883
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: The Internet of Vehicles (IoV), whereby interconnected vehicles communicate
with each other and with road infrastructure on a common network, has promising
socio-economic benefits but also poses new cyber-physical threats. Data on
vehicular attackers can be realistically gathered through cyber threat
intelligence using systems like honeypots. Admittedly, configuring honeypots
introduces a trade-off between the level of honeypot-attacker interactions and
any incurred overheads and costs for implementing and monitoring these
honeypots. We argue that effective deception can be achieved through
strategically configuring the honeypots to represent components of the IoV and
engage attackers to collect cyber threat intelligence. In this paper, we
present HoneyCar, a novel decision support framework for honeypot deception in
IoV. HoneyCar builds upon a repository of known vulnerabilities of the
autonomous and connected vehicles found in the Common Vulnerabilities and
Exposure (CVE) data within the National Vulnerability Database (NVD) to compute
optimal honeypot configuration strategies. By taking a game-theoretic approach,
we model the adversarial interaction as a repeated imperfect-information
zero-sum game in which the IoV network administrator chooses a set of
vulnerabilities to offer in a honeypot and a strategic attacker chooses a
vulnerability of the IoV to exploit under uncertainty. Our investigation is
substantiated by examining two different versions of the game, with and without
the re-configuration cost to empower the network administrator to determine
optimal honeypot configurations. We evaluate HoneyCar in a realistic use case
to support decision makers with determining optimal honeypot configuration
strategies for strategic deployment in IoV.
Related papers
- LLM Honeypot: Leveraging Large Language Models as Advanced Interactive Honeypot Systems [0.0]
Honeypots are decoy systems designed to lure and interact with attackers.
We present a novel approach to creating realistic and interactive honeypot systems using Large Language Models.
arXiv Detail & Related papers (2024-09-12T17:33:06Z) - Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks [55.340315838742015]
Negligence on the security of infotainment data communication in IoV networks can unintentionally open an easy access point for social engineering attacks.
In particular, we first classify data communication in the IoV network, examine the security focus of each data communication, and then develop a differentiated security architecture to provide security protection on a file-to-file basis.
arXiv Detail & Related papers (2024-03-29T12:01:31Z) - Multi-Objective Optimization for UAV Swarm-Assisted IoT with Virtual
Antenna Arrays [55.736718475856726]
Unmanned aerial vehicle (UAV) network is a promising technology for assisting Internet-of-Things (IoT)
Existing UAV-assisted data harvesting and dissemination schemes require UAVs to frequently fly between the IoTs and access points.
We introduce collaborative beamforming into IoTs and UAVs simultaneously to achieve energy and time-efficient data harvesting and dissemination.
arXiv Detail & Related papers (2023-08-03T02:49:50Z) - Convergence of Communications, Control, and Machine Learning for Secure
and Autonomous Vehicle Navigation [78.60496411542549]
Connected and autonomous vehicles (CAVs) can reduce human errors in traffic accidents, increase road efficiency, and execute various tasks. Reaping these benefits requires CAVs to autonomously navigate to target destinations.
This article proposes solutions using the convergence of communication theory, control theory, and machine learning to enable effective and secure CAV navigation.
arXiv Detail & Related papers (2023-07-05T21:38:36Z) - Reinforcement Learning based Cyberattack Model for Adaptive Traffic
Signal Controller in Connected Transportation Systems [61.39400591328625]
In a connected transportation system, adaptive traffic signal controllers (ATSC) utilize real-time vehicle trajectory data received from vehicles to regulate green time.
This wirelessly connected ATSC increases cyber-attack surfaces and increases their vulnerability to various cyber-attack modes.
One such mode is a'sybil' attack in which an attacker creates fake vehicles in the network.
An RL agent is trained to learn an optimal rate of sybil vehicle injection to create congestion for an approach(s)
arXiv Detail & Related papers (2022-10-31T20:12:17Z) - LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in
The Internet of Vehicles [7.795462813462946]
Intrusion Detection Systems (IDSs) that can identify malicious cyber-attacks have been developed.
We propose a novel ensemble IDS framework named Leader Class and Confidence Decision Ensemble (LCCDE)
LCCDE is constructed by determining the best-performing ML model among three advanced algorithms.
arXiv Detail & Related papers (2022-08-05T22:30:34Z) - Federated Deep Learning Meets Autonomous Vehicle Perception: Design and
Verification [168.67190934250868]
Federated learning empowered connected autonomous vehicle (FLCAV) has been proposed.
FLCAV preserves privacy while reducing communication and annotation costs.
It is challenging to determine the network resources and road sensor poses for multi-stage training.
arXiv Detail & Related papers (2022-06-03T23:55:45Z) - Simulating Malicious Attacks on VANETs for Connected and Autonomous
Vehicle Cybersecurity: A Machine Learning Dataset [0.4129225533930965]
Connected and Autonomous Vehicles (CAVs) rely on Vehicular Adhoc Networks with wireless communication between vehicles and roadside infrastructure to support safe operation.
cybersecurity attacks pose a threat to VANETs and the safe operation of CAVs.
This study proposes the use of simulation for modelling typical communication scenarios which may be subject to malicious attacks.
arXiv Detail & Related papers (2022-02-15T20:08:58Z) - What are Attackers after on IoT Devices? An approach based on a
multi-phased multi-faceted IoT honeypot ecosystem and data clustering [11.672070081489565]
Honeypots have been historically used as decoy devices to help researchers gain a better understanding of the dynamic of threats on a network.
In this work, we presented a new approach to creating a multi-phased, multi-faceted honeypot ecosystem.
We were able to collect increasingly sophisticated attack data in each phase.
arXiv Detail & Related papers (2021-12-21T04:11:45Z) - The Feasibility and Inevitability of Stealth Attacks [63.14766152741211]
We study new adversarial perturbations that enable an attacker to gain control over decisions in generic Artificial Intelligence systems.
In contrast to adversarial data modification, the attack mechanism we consider here involves alterations to the AI system itself.
arXiv Detail & Related papers (2021-06-26T10:50:07Z) - Smart and Secure CAV Networks Empowered by AI-Enabled Blockchain: Next
Frontier for Intelligent Safe-Driving Assessment [17.926728975133113]
Securing a safe-driving circumstance for connected and autonomous vehicles (CAVs) continues to be a widespread concern.
We propose a novel framework of algorithm-enabled intElligent Safe-driving assessmenT (BEST) to offer a smart and reliable approach.
arXiv Detail & Related papers (2021-04-09T19:08:34Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.