A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing

被引:15
|
作者
An, Xingshuo [1 ]
Lin, Fuhong [1 ]
Xu, Shenggang [1 ]
Miao, Li [1 ]
Gong, Chao [1 ]
机构
[1] USTB, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
基金
美国国家科学基金会; 国家重点研发计划;
关键词
D O I
10.1155/2018/1821804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog computing. We have introduced a fog computing IDS (FC-IDS) framework in our previous work. In this paper, we study the optimal intrusion response strategy in fog computing based on the FC-IDS scheme proposed in our previous work. We postulate the intrusion process in fog computing and describe it with a mathematical model based on differential game theory. According to this model, the optimal response strategy is obtained corresponding to the optimal intrusion strategy. Theoretical analysis and simulation results demonstrate that our security model can effectively stabilize the intrusion frequency of the invaders in fog computing.
引用
收藏
页数:9
相关论文
共 50 条
  • [31] A Queueing Game Based Management Framework for Fog Computing With Strategic Computing Speed Control
    Yi, Changyan
    Cai, Jun
    Zhu, Kun
    Wang, Ran
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 21 (05) : 1537 - 1551
  • [32] Service Based FOG Computing Model for IoT
    Ashrafi, Tasnia H.
    Hossain, Md. A.
    Arefin, Sayed E.
    Das, Kowshik D. J.
    Chakrabarty, Amitabha
    2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 163 - 172
  • [33] An IoT-Based Fog Computing Model
    Ma, Kun
    Bagula, Antoine
    Nyirenda, Clement
    Ajayi, Olasupo
    SENSORS, 2019, 19 (12)
  • [34] A Fog Computing Based Smart Grid Model
    Okay, Feyza Yildirim
    Ozdemir, Suat
    2016 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS (ISNCC), 2016,
  • [35] BLOCKFOG: A BLOCKCHAIN-BASED FRAMEWORK FOR INTRUSION DEFENSE IN IOT FOG COMPUTING
    Prasuna, V. G.
    Babu, B. Ravindra
    Pydala, Bhasha
    SCALABLE COMPUTING-PRACTICE AND EXPERIENCE, 2024, 25 (03): : 1950 - 1962
  • [36] Human Immune-Based Intrusion Detection and Prevention System for Fog Computing
    Aliyu, Farouq
    Sheltami, Tarek
    Deriche, Mohamed
    Nasser, Nidal
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2022, 30 (01)
  • [37] BLOCKFOG: A BLOCKCHAIN-BASED FRAMEWORK FOR INTRUSION DEFENSE IN IOT FOG COMPUTING
    Prasuna V.G.
    Babu B.R.
    Pydala B.
    Scalable Computing, 2024, 25 (03): : 1950 - 1962
  • [38] Human Immune-Based Intrusion Detection and Prevention System for Fog Computing
    Farouq Aliyu
    Tarek Sheltami
    Mohamed Deriche
    Nidal Nasser
    Journal of Network and Systems Management, 2022, 30
  • [39] Cloudchain: A Blockchain-Based Coopetition Differential Game Model for Cloud Computing
    Taghavi, Mona
    Bentahar, Jamal
    Otrok, Hadi
    Bakhtiyari, Kaveh
    SERVICE-ORIENTED COMPUTING (ICSOC 2018), 2018, 11236 : 146 - 161
  • [40] A response selection model for intrusion response systems: Response Strategy Model (RSM)
    Anuar, Nor Badrul
    Papadaki, Maria
    Furnell, Steven
    Clarke, Nathan
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1831 - 1848