A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing

被引:15
|
作者
An, Xingshuo [1 ]
Lin, Fuhong [1 ]
Xu, Shenggang [1 ]
Miao, Li [1 ]
Gong, Chao [1 ]
机构
[1] USTB, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
基金
美国国家科学基金会; 国家重点研发计划;
关键词
D O I
10.1155/2018/1821804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog computing. We have introduced a fog computing IDS (FC-IDS) framework in our previous work. In this paper, we study the optimal intrusion response strategy in fog computing based on the FC-IDS scheme proposed in our previous work. We postulate the intrusion process in fog computing and describe it with a mathematical model based on differential game theory. According to this model, the optimal response strategy is obtained corresponding to the optimal intrusion strategy. Theoretical analysis and simulation results demonstrate that our security model can effectively stabilize the intrusion frequency of the invaders in fog computing.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] Decision model of intrusion response based on markov game in fog computing environment
    Ma, Xiaoxue
    Li, Yun
    Gao, Yan
    WIRELESS NETWORKS, 2023, 29 (08) : 3383 - 3392
  • [2] Decision model of intrusion response based on markov game in fog computing environment
    Xiaoxue Ma
    Yun Li
    Yan Gao
    Wireless Networks, 2023, 29 : 3383 - 3392
  • [3] A differential game model of intrusion detection system in cloud computing
    Li, Zhi
    Xu, Haitao
    Liu, Yanzhu
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (01):
  • [4] A Non-Cooperative Differential Game-Based Security Model in Fog Computing
    Zhi Li
    Xianwei Zhou
    Yanzhu Liu
    Haitao Xu
    Li Miao
    中国通信, 2017, 14 (01) : 180 - 189
  • [5] A Non-Cooperative Differential Game-Based Security Model in Fog Computing
    Li, Zhi
    Zhou, Xianwei
    Liu, Yanzhu
    Xu, Haitao
    Miao, Li
    CHINA COMMUNICATIONS, 2017, 14 (01) : 180 - 189
  • [6] Optimal defense strategy model based on differential game in edge computing
    Sun, Yan
    Li, Yaobing
    Chen, Xuehong
    Li, Jun
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 39 (02) : 1449 - 1459
  • [7] Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system
    Xingshuo An
    Jingtao Su
    Xing Lü
    Fuhong Lin
    EURASIP Journal on Wireless Communications and Networking, 2018
  • [8] Hypergraph clustering model-based association analysis of DDOS attacks in fog computing intrusion detection system
    An, Xingshuo
    Su, Jingtao
    Lue, Xing
    Lin, Fuhong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2018,
  • [9] Research on intrusion response strategy based on static Bayesian game in mobile edge computing network
    Fan W.
    Peng C.
    Zhu D.
    Wang Y.
    Tongxin Xuebao/Journal on Communications, 2023, 44 (02): : 70 - 81
  • [10] Dynamic game based intrusion response model
    Zhu, Jianqi
    Liu, Yanheng
    Yang, Xu
    Sun, Xin
    Journal of Computational Information Systems, 2010, 6 (07): : 2199 - 2211