A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing

被引:15
|
作者
An, Xingshuo [1 ]
Lin, Fuhong [1 ]
Xu, Shenggang [1 ]
Miao, Li [1 ]
Gong, Chao [1 ]
机构
[1] USTB, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
基金
美国国家科学基金会; 国家重点研发计划;
关键词
D O I
10.1155/2018/1821804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog computing. We have introduced a fog computing IDS (FC-IDS) framework in our previous work. In this paper, we study the optimal intrusion response strategy in fog computing based on the FC-IDS scheme proposed in our previous work. We postulate the intrusion process in fog computing and describe it with a mathematical model based on differential game theory. According to this model, the optimal response strategy is obtained corresponding to the optimal intrusion strategy. Theoretical analysis and simulation results demonstrate that our security model can effectively stabilize the intrusion frequency of the invaders in fog computing.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks
    Labiod, Yasmine
    Korba, Abdelaziz Amara
    Ghoualmi, Nacira
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 125 (01) : 231 - 259
  • [42] Fog Computing-Based Intrusion Detection Architecture to Protect IoT Networks
    Yasmine Labiod
    Abdelaziz Amara Korba
    Nacira Ghoualmi
    Wireless Personal Communications, 2022, 125 : 231 - 259
  • [43] Model-based design of game AI
    Denault, Alexandre
    Kienzle, Jorg
    Vangheluwe, Hans
    GAMEON-NA 2006: 2ND INTERNATIONAL NORTH-AMERICAN CONFERENCE ON INTELLIGENT GAMES AND SIMULATION, 2006, : 67 - +
  • [44] The strategy of model-based science
    Peter Godfrey-Smith
    Biology and Philosophy, 2006, 21 : 725 - 740
  • [45] The strategy of model-based science
    Godfrey-Smith, Peter
    BIOLOGY & PHILOSOPHY, 2006, 21 (05) : 725 - 740
  • [46] Lightweight Intrusion Detection Model of the Internet of Things with Hybrid Cloud-Fog Computing
    Zhao, Guosheng
    Wang, Yang
    Wang, Jian
    SECURITY AND COMMUNICATION NETWORKS, 2023, 2023
  • [47] Fog Computing-Based Differential Positioning Method for BDS
    Wang, Lina
    Li, Linlin
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
  • [48] Research on the Strategy of Drones Intrusion Detection Based on Game Theory
    Wang, Dinghua
    Feng, Dongqin
    2018 IEEE 9TH ANNUAL INFORMATION TECHNOLOGY, ELECTRONICS AND MOBILE COMMUNICATION CONFERENCE (IEMCON), 2018, : 613 - 619
  • [49] A Dynamic Game Model for Resource Allocation in Fog Computing for Ubiquitous Smart Grid
    Li, Zhi
    Liu, Yanzhu
    Xin, Rui
    Gao, Lifang
    Ding, Xueying
    Hu, Yubo
    2019 28TH WIRELESS AND OPTICAL COMMUNICATIONS CONFERENCE (WOCC), 2019, : 63 - 67
  • [50] MODEL-BASED NEUROIMAGING FOR COGNITIVE COMPUTING
    Poznanski, Roman R.
    JOURNAL OF INTEGRATIVE NEUROSCIENCE, 2009, 8 (03) : 345 - 369