Research on intrusion response strategy based on static Bayesian game in mobile edge computing network

被引:0
|
作者
Fan W. [1 ,2 ]
Peng C. [1 ,2 ]
Zhu D. [1 ,2 ]
Wang Y. [1 ,2 ]
机构
[1] Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[2] School of Cyber Security, University of Chinese Academy of Sciences, Beijing
来源
基金
国家重点研发计划;
关键词
Bayesian-Nash equilibrium; mobile edge computing; static Bayesian game;
D O I
10.11959/j.issn.1000-436x.2023040
中图分类号
学科分类号
摘要
In the mobile edge computing (MEC) environment, the resources of edge nodes are limited. It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions. An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders. The probability of attackers and defenders in the game process was predicted respectively. The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model. The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes. The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided. © 2023 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:70 / 81
页数:11
相关论文
共 23 条
  • [1] ARMBRUST M, FOX A, GRIFFITH R, Et al., A view of cloud computing, Communications of the ACM, 53, 4, pp. 50-58, (2010)
  • [2] HU Y C, PATEL M, SABELLA D, Et al., Mobile edge computing-a key technology towards 5G[R], (2015)
  • [3] LUAN T H, GAO L X, LI Z, Et al., Fog computing: focusing on mobile users at the edge, (2015)
  • [4] PRABAVATHY S, SUNDARAKANTHAM K, SHALINIE S M., Design of cognitive fog computing for intrusion detection in Internet of things, Journal of Communications and Networks, 20, 3, pp. 291-298, (2018)
  • [5] LI Y, HUANG C L, WANG Z F, Et al., Survey of software vulnerability mining methods based on machine learning, Journal of Software, 31, 7, pp. 2040-2061, (2020)
  • [6] ZHANG Y Q, DONG Y, LIU C Y, Et al., Situation, trends and prospects of deep learning applied to cyberspace security, Journal of Computer Research and Development, 55, 6, pp. 1117-1142, (2018)
  • [7] LEE S J, YOO P D, ASYHARI A T, Et al., IMPACT: impersonation attack detection via edge computing using deep autoencoder and feature abstraction, IEEE Access, 8, pp. 65520-65529, (2020)
  • [8] LI Z C, GAO H Y, ZHANG W X., An efficient edge computing intrusion detection algorithm based on improved ELM, Computer Measurement & Control, 29, 7, pp. 223-228, (2021)
  • [9] SUDQI K B, ABDUL W A W B, IDRIS M Y I B, Et al., A lightweight perceptron-based intrusion detection system for fog computing, Applied Sciences, 9, 1, (2019)
  • [10] SOUZA C A D, WESTPHALL C B, MACHADO R B, Et al., Hybrid approach to intrusion detection in fog-based IoT environments, Computer Networks, 180, (2020)