NCGTM: A Noncooperative Game-Theoretic Model to Assist IDS in Cloud Environment

被引:6
作者
Gill, Komal Singh [1 ]
Saxena, Sharad [1 ]
Sharma, Anju [2 ]
机构
[1] Thapar Inst Engn & Technol, Comp Sci & Engn Dept, Patiala 147004, India
[2] MRSPTU, Dept Computat Sci, Bathinda 151001, India
关键词
Cloud computing; Security; Internet of Things; Game theory; Games; Numerical models; Analytical models; game theory; intrusion detection system (IDS); machine learning (ML); malware; ATTACKS;
D O I
10.1109/TII.2023.3300452
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has proved to be a high-quality delivery paradigm over the past years. Some of the devices linked with the Cloud have weak security implications. The attacker can inject malware to disrupt the network and compromise the Cloud servers. An intrusion detection system (IDS) used to detect malicious activities in the network needs an improvement over the detection rate (DR) and false positive rate (FPR). In this article, a game-theoretic model has been devised to evaluate the attacker and the defender's strategies and assist the IDS in detecting the attack. The Nash equilibrium has been calculated using graphical methods to conclude the game. The proposed model is validated on real dataset using a machine learning stacked ensemble framework. With the proposed model, the results show an increase in the DR by 0.23, 0.03, and 0.05 percent, an increase in payoff by 0.22, 0.199, and 0.126 percent, a decrease in the FPR by 0.02, 0.03, and 0.07 percent of the IDS as compared to the other models.
引用
收藏
页码:3124 / 3132
页数:9
相关论文
共 21 条
[1]  
Aldribi A., 2020, Tech. rep.
[2]   Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking [J].
Aldribi, Abdulaziz ;
Traore, Issa ;
Moa, Belaid ;
Nwamuo, Onyekachi .
COMPUTERS & SECURITY, 2020, 88
[3]   Network Intrusion Detection System Using Neural Network and Condensed Nearest Neighbors with Selection of NSL-KDD Influencing Features [J].
Belgrana, Fatima Zohra ;
Benamrane, Nacera ;
Hamaida, Mohamed Amine ;
Chaabani, Abdellah Mohamed ;
Taleb-Ahmed, Abdelmalik .
2020 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS AND INTELLIGENCE SYSTEM (IOTAIS), 2021, :23-29
[4]   A game theoretic method to model and analyze attack-defense strategy of resource service in cloud application [J].
Fan, Guisheng ;
Chen, Liqiong ;
Yu, Huiqun .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (12)
[5]   GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot [J].
Gill, Komal Singh ;
Saxena, Sharad ;
Sharma, Anju .
COMPUTERS & SECURITY, 2020, 92 (92)
[6]   Noncooperative load balancing in distributed systems [J].
Grosu, D ;
Chronopoulos, AT .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2005, 65 (09) :1022-1034
[7]   XAI for intrusion detection system: comparing explanations based on global and local scope [J].
Hariharan, Swetha ;
Robinson, R. R. Rejimol ;
Prasad, Rendhir R. ;
Thomas, Ciza ;
Balakrishnan, N. .
JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (02) :217-239
[8]   Game theoretic modeling of economic denial of sustainability (EDoS) attack in cloud computing [J].
Lalropuia, K. C. ;
Khaitan , Vandana .
PROBABILITY IN THE ENGINEERING AND INFORMATIONAL SCIENCES, 2022, 36 (04) :1241-1265
[9]   A New Service Mechanism for Profit Optimizations of a Cloud Provider and Its Users [J].
Liu, Chubo ;
Li, Kenli ;
Li, Keqin ;
Buyya, Rajkumar .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (01) :14-26
[10]   AS-IDS: Anomaly and Signature Based IDS for the Internet of Things [J].
Otoum, Yazan ;
Nayak, Amiya .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2021, 29 (03)