z-logo
open-access-imgOpen Access
A Mimic Honeypot Construction Method Based on Incomplete Information Zero-Sum Stochastic Games and Q-Learning
Author(s) -
Sisi Shao,
Zongkai Ji,
Xukun Qian,
Fei Wu,
Shangdong Liu,
Yimu Ji
Publication year - 2025
Publication title -
ieee internet of things journal
Language(s) - English
Resource type - Magazines
SCImago Journal Rank - 2.075
H-Index - 97
eISSN - 2327-4662
DOI - 10.1109/jiot.2025.3609800
Subject(s) - computing and processing , communication, networking and broadcast technologies
Honeypots based on the deception technology offer a promising solution to address the asymmetry of attack and defense in the Internet of Things (IoTs). However, as the IoT security situation continues to evolve, attackers can identify honeypots by analyzing system characteristics and network behaviors, launching targeted virtual escape attacks that may exploit the honeypot as a stepping stone to compromise other systems. Once the IoT honeypot itself is successfully identified and attacked, the current defense measures typically rely on postattack remediation. To address this challenge, we propose a mimic honeypot construction method based on incomplete information zero-sum stochastic game and Q-learning. This method enhances the IoT honeypot’s deceptive capabilities while ensuring the security of the honeypot itself. First, inspired by the concept of mimic defense (MD), we design a dynamic heterogeneous redundancy (DHR) honeypot (mimic honeypot), which contains multiple business executors composed of both business and virtualization layers. Second, we establish an incomplete information zero-sum stochastic game model to represent the honeypot attack–defense scenario. The Q-learning algorithm is employed to solve for the Bayesian Nash equilibrium, enabling the mimic honeypot to adaptively adjust its deployment strategies based on the attacker’s observed actions. Finally, the experimental results demonstrate that the proposed mimic honeypot outperforms existing methods in terms of deceptive effectiveness and honeypot self-protection capabilities, significantly reducing the likelihood of honeypot compromise and ensuring the robust network defense.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom