The Internet of Vehicles (IoV), whereby interconnected vehicles communicate with each other and with road infrastructure on a common network, has promising socio-economic benefits but also poses new cyber-physical threats. Data on vehicular attackers can be realistically gathered through cyber threat intelligence using systems like honeypots. Admittedly, configuring honeypots introduces a trade-off between the level of honeypot-attacker interactions and any incurred overheads and costs for implementing and monitoring these honeypots. We argue that effective deception can be achieved through strategically configuring the honeypots to represent components of the IoV and engage attackers to collect cyber threat intelligence. In this paper, we present HoneyCar, a novel decision support framework for honeypot deception in IoV. HoneyCar builds upon a repository of known vulnerabilities of the autonomous and connected vehicles found in the Common Vulnerabilities and Exposure (CVE) data within the National Vulnerability Database (NVD) to compute optimal honeypot configuration strategies. By taking a game-theoretic approach, we model the adversarial interaction as a repeated imperfect-information zero-sum game in which the IoV network administrator chooses a set of vulnerabilities to offer in a honeypot and a strategic attacker chooses a vulnerability of the IoV to exploit under uncertainty. Our investigation is substantiated by examining two different versions of the game, with and without the re-configuration cost to empower the network administrator to determine optimal honeypot configurations. We evaluate HoneyCar in a realistic use case to support decision makers with determining optimal honeypot configuration strategies for strategic deployment in IoV.
翻译:汽车互联网(IoV)是相互连接的车辆在共用网络上相互交流的渠道,它与道路基础设施之间相互联系,具有良好的社会经济效益,但也带来了新的网络物理威胁。关于车辆袭击者的数据可以通过使用蜂蜜罐等系统进行网络威胁情报的现实收集。诚然,配置蜂蜜罐在国家脆弱性数据库(NVD)内发现的自主和连接车辆的已知弱点储存库中,可以权衡蜂蜜罐攻击者相互作用的程度,以及实施和监测这些蜂蜜罐所产生的任何间接费用和费用。我们主张,通过从战略角度对蜂蜜罐进行配置,以代表IoV的各组成部分,并让攻击者收集网络威胁情报。在本文中,我们介绍“蜂蜜卡”是一个创新的决策支持框架,用以在IoV网络中进行蜂蜜欺骗。根据共同脆弱性和暴露(CVE)数据,确定一个已知的自主和连接车辆弱点,以计算最佳蜂蜜罐配置战略。我们采用游戏理论评估,将对抗性互动作为反复出现的不完善的信息零和游戏游戏游戏。在不威胁情报游戏中,Iocar网络管理员在不选择一种战略脆弱性研究中,通过一种测试来评估,确定我们的风险脆弱性。