Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach

被引:47
|
作者
Min, Minghui [1 ,2 ]
Xiao, Liang [1 ,2 ]
Xie, Caixia [1 ,2 ]
Hajimirsadeghi, Mohammad [3 ]
Mandayam, Narayan B. [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen 361005, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 211189, Jiangsu, Peoples R China
[3] Rutgers State Univ, Dept Elect & Comp Engn, Wireless Informat Network Lab, New Brunswick, NJ 08816 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 06期
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Advanced persistent threats (APTs); central processing unit (CPU) allocation; cloud security; Colonel Blotto game (CBG); data protection level; reinforcement learning (RL);
D O I
10.1109/JIOT.2018.2844878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) attackers apply multiple sophisticated methods to continuously and stealthily steal information from the targeted cloud storage systems and can even induce the storage system to apply a specific defense strategy and attack it accordingly. In this paper, the interactions between an APT attacker and a defender allocating their central processing units (CPUs) over multiple storage devices in a cloud storage system are formulated as a Colonel Blotto game. The Nash equilibria of the CPU allocation game are derived for both symmetric and asymmetric CPUs between the APT attacker and the defender to evaluate how the limited CPU resources, the data storage size and the number of storage devices impact the expected data protection level and the utility of the cloud storage system. A CPU allocation scheme based on "hotbooting" policy hill-climbing that exploits the experiences in similar scenarios to initialize the quality values to accelerate the learning speed is proposed for the defender to achieve the optimal APT defense performance in the dynamic game without being aware of the APT attack model and the data storage model. A hotbooting deep Q-network-based CPU allocation scheme further improves the APT detection performance for the case with a large number of CPUs and storage devices. Simulation results show that our proposed reinforcement learning-based CPU allocation can improve both the data protection level and the utility of the cloud storage system compared with the Q-learning-based CPU allocation against APTs.
引用
收藏
页码:4250 / 4261
页数:12
相关论文
共 50 条
  • [31] Defense Against Advanced Persistent Threats: Optimal Network Security Hardening Using Multi-stage Maze Network Game
    Zhang, Hangsheng
    Liu, Haitao
    Liang, Jie
    Li, Ting
    Geng, Liru
    Liu, Yinlong
    Chen, Shujuan
    2020 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2020, : 724 - 729
  • [32] Modeling and study of defense outsourcing against advanced persistent threat through impulsive differential game approach
    Qin, Yang
    Yang, Xiaofan
    Yang, Lu-Xing
    Huang, Kaifan
    COMPUTERS & SECURITY, 2024, 145
  • [33] Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
    Sahabandu, Dinuka
    Allen, Joey
    Moothedath, Shana
    Bushnell, Linda
    Lee, Wenke
    Poovendran, Radha
    2020 ACM/IEEE 11TH INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2020), 2020, : 9 - 19
  • [34] Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid
    Tian, Wen
    Ji, Xiaopeng
    Liu, Weiwei
    Liu, Guangjie
    Zhai, Jiangtao
    Dai, Yuewei
    Huang, Shuhua
    IEEE ACCESS, 2020, 8 (08): : 64075 - 64085
  • [35] A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems
    Zhang, Lefeng
    Zhu, Tianqing
    Hussain, Farookh Khadeer
    Ye, Dayong
    Zhou, Wanlei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1349 - 1364
  • [36] Safeguarding UAV-Enabled Wireless Power Transfer Against Aerial Eavesdropper: A Colonel Blotto Game
    Zhang, Long
    Wang, Yao
    Han, Zhu
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (03) : 503 - 507
  • [37] An adaptive defense mechanism to prevent advanced persistent threats
    Xie, Yi-xi
    Ji, Li-xin
    Li, Ling-shu
    Guo, Zehua
    Baker, Thar
    CONNECTION SCIENCE, 2021, 33 (02) : 359 - 379
  • [38] SECaaS-Based Partially Observable Defense Model for IIoT Against Advanced Persistent Threats
    Zhang, Zikai
    Ding, Chuntao
    Li, Yidong
    Yu, Jinhui
    Li, Jingyi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 4267 - 4280
  • [39] An Ontology Based Approach for Data Leakage Prevention Against Advanced Persistent Threats
    Kaya, Emrah
    Ozcelik, Ibrahim
    Can, Ozgu
    METADATA AND SEMANTIC RESEARCH, MTSR 2019, 2019, 1057 : 115 - 125
  • [40] Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats
    Chen, Ziqin
    Chen, Guanpu
    Hong, Yiguang
    UNMANNED SYSTEMS, 2024, 12 (02) : 341 - 358