A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things

被引:8
作者
Chen, Lili [1 ,2 ]
Wang, Zhen [2 ,3 ]
Li, Fenghua [1 ,2 ,4 ]
Guo, Yunchuan [2 ]
Geng, Kui [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[3] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cybersecur, Beijing 100049, Peoples R China
关键词
outbreak detection; Internet of Things; Stackelberg game; dynamic scheduling strategy; THEORETIC RESOURCE-ALLOCATION; INTRUSION-DETECTION; IOT; MANAGEMENT; BRANCH;
D O I
10.3390/s20030804
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With limited computing resources and a lack of physical lines of defense, the Internet of Things (IoT) has become a focus of cyberattacks. In recent years, outbreak propagation attacks against the IoT have occurred frequently, and these attacks are often strategical. In order to detect the outbreak propagation as soon as possible, t embedded Intrusion Detection Systems (IDSs) are widely deployed in the IoT. This paper tackles the problem of outbreak detection in adversarial environment in the IoT. A dynamic scheduling strategy based on specific IDSs monitoring of IoT devices is proposed to avoid strategic attacks. Firstly, we formulate the interaction between the defender and attacker as a Stackelberg game in which the defender first chooses a set of device nodes to activate, and then the attacker selects one seed (one device node) to spread the worms. This yields an extremely complex bilevel optimization problem. Our approach is to build a modified Column Generation framework for computing the optimal strategy effectively. The optimal response of the defender's problem is expressed as mixed-integer linear programming (MILPs). It is proved that the solution of the defender's optimal response is a NP-hard problem. Moreover, the optimal response of defenders is improved by an approximate algorithm--a greedy algorithm. Finally, the proposed scheme is tested on some randomly generated instances. The experimental results show that the scheme is effective for monitoring optimal scheduling.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks
    Acarali, Dilara
    Rajarajan, Muttukrishnan
    Komninos, Nikos
    Zarpelao, B. B.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [2] Internet of Things security: A survey
    Alaba, Fadele Ayotunde
    Othman, Mazliza
    Hashem, Ibrahim Abaker Targio
    Alotaibi, Faiz
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 88 : 10 - 28
  • [3] Jamming in wireless networks: the case of several jammers
    Altman, Eitan
    Avrachenkov, Konstantin
    Garnaev, Andrey
    [J]. 2009 INTERNATIONAL CONFERENCE ON GAME THEORY FOR NETWORKS (GAMENETS 2009), 2009, : 585 - +
  • [4] [Anonymous], AUTOMATICA
  • [5] [Anonymous], ELECTRONICS
  • [6] [Anonymous], SECURITY PRIVACY INT
  • [7] Emergence of scaling in random networks
    Barabási, AL
    Albert, R
    [J]. SCIENCE, 1999, 286 (5439) : 509 - 512
  • [8] A Critical Review of Practices and Challenges in Intrusion Detection Systems for IoT: Toward Universal and Resilient Systems
    Benkhelifa, Elhadj
    Welsh, Thomas
    Hamouda, Walaa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04): : 3496 - 3509
  • [9] Bethencourt J, 2005, USENIX ASSOCIATION PROCEEDINGS OF THE 14TH USENIX SECURITY SYMPOSIUM, P193
  • [10] Pareto Optimal Resource Management for Wireless Mesh Networks with QoS Assurance: Joint Node Clustering and Subcarrier Allocation
    Cheng, Ho Ting
    Zhuang, Weihua
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2009, 8 (03) : 1573 - 1583