Enhancing cloud security: harnessing bayesian game theory for a dynamic defense mechanism

被引:6
作者
Kandoussi, El Mehdi [1 ]
Houmairi, Adam [2 ]
El Mir, Iman [3 ]
Bellafkih, Mostafa [1 ]
机构
[1] Natl Inst Posts & Telecommun INPT, Telecommun Syst Networks & Serv STRS Lab, Rabat, Morocco
[2] Sultan Moulay Slimane Univ USMS, Natl Sch Appl Sci Khouribga ENSAK, Sci & Technol Engn Lab LaSTI, Natl Sch Appl Sci, Beni Mellal, Morocco
[3] Hassan 1st Univ, Fac Sci & Technol, Comp Networks Mobil & Modeling Lab, Settat, Morocco
来源
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS | 2024年 / 27卷 / 09期
关键词
Cloud computing; Migration; Honeypot; Attack path; Game theory; Bayesian Nash equilibrium; MOVING TARGET DEFENSE; SYSTEM; MODEL;
D O I
10.1007/s10586-024-04604-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security challenges in complex information technologies continue to grow and diversify. To improve network security, many researchers have explored the game theoretic approach as a hopeful modeling tool. Knowing that the attacker can take advantage of vulnerabilities and explore existing weaknesses in the network configuration to gain access to the system for a successful attack, our objective is to benefit from virtual machines' migration as a moving target defense technique and honeypot as a deceiving technique to increase the attack surface's dynamicity. This paper presents a game-theoretic framework for modeling attack-defense interaction. A model based on incomplete information game and attack graph is developed. Our main findings reveal in which case migration of virtual machines should be established in a architecture where a honeypot is deployed and identify the potential attack paths based on system security parameters. This provides network administrators with the ability to find unsecure nodes, avoid negative externality and more precisely inefficient migrations which impact the quality of service.
引用
收藏
页码:12509 / 12526
页数:18
相关论文
共 51 条
[1]   Behavioral and Game-Theoretic Security Investments in Interdependent Systems Modeled by Attack Graphs [J].
Abdallah, Mustafa ;
Naghizadeh, Parinaz ;
Hota, Ashish R. ;
Cason, Timothy ;
Bagchi, Saurabh ;
Sundaram, Shreyas .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (04) :1585-1596
[2]   Honeypot Allocation for Cyber Deception in Dynamic Tactical Networks: A Game Theoretic Approach [J].
Abu Sayed, Md ;
Anwar, Ahmed H. ;
Kiekintveld, Christopher ;
Kamhoua, Charles .
DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2023, 2023, 14167 :195-214
[3]  
Akshaya S., 2024, Int. J. Intell. Syst. Appl. Eng., V12, P643
[4]   Intrusion Detection Systems: A State-of-the-Art Taxonomy and Survey [J].
Alkasassbeh, Mouhammd ;
Baddar, Sherenaz Al-Haj .
ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2023, 48 (08) :10021-10064
[5]   Cloud Security Threats and Solutions: A Survey [J].
Butt, Umer Ahmed ;
Amin, Rashid ;
Mehmood, Muhammad ;
Aldabbas, Hamza ;
Alharbi, Mafawez T. ;
Albaqami, Nasser .
WIRELESS PERSONAL COMMUNICATIONS, 2023, 128 (01) :387-413
[6]  
Chen L., 2023, INT J SYST MANAG INN, V13
[7]  
Chiang CYJ, 2018, IEEE MILIT COMMUN C, P110, DOI 10.1109/MILCOM.2018.8599755
[8]   Learning to play Bayesian games [J].
Dekel, E ;
Fudenberg, D ;
Levine, DK .
GAMES AND ECONOMIC BEHAVIOR, 2004, 46 (02) :282-303
[9]   Playing Bayesian Stackelberg game model for optimizing the vulnerability level of security incident system in petrochemical plants [J].
Dong, Mingxin ;
Zhang, Zhen ;
Liu, Yi ;
Zhao, Dong Feng ;
Meng, Yifei ;
Shi, Jihao .
RELIABILITY ENGINEERING & SYSTEM SAFETY, 2023, 235
[10]   Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing [J].
El Kafhali, Said ;
El Mir, Iman ;
Hanini, Mohamed .
ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2022, 29 (01) :223-246