A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things

被引:8
作者
Chen, Lili [1 ,2 ]
Wang, Zhen [2 ,3 ]
Li, Fenghua [1 ,2 ,4 ]
Guo, Yunchuan [2 ]
Geng, Kui [2 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
[3] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou 310018, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cybersecur, Beijing 100049, Peoples R China
关键词
outbreak detection; Internet of Things; Stackelberg game; dynamic scheduling strategy; THEORETIC RESOURCE-ALLOCATION; INTRUSION-DETECTION; IOT; MANAGEMENT; BRANCH;
D O I
10.3390/s20030804
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
With limited computing resources and a lack of physical lines of defense, the Internet of Things (IoT) has become a focus of cyberattacks. In recent years, outbreak propagation attacks against the IoT have occurred frequently, and these attacks are often strategical. In order to detect the outbreak propagation as soon as possible, t embedded Intrusion Detection Systems (IDSs) are widely deployed in the IoT. This paper tackles the problem of outbreak detection in adversarial environment in the IoT. A dynamic scheduling strategy based on specific IDSs monitoring of IoT devices is proposed to avoid strategic attacks. Firstly, we formulate the interaction between the defender and attacker as a Stackelberg game in which the defender first chooses a set of device nodes to activate, and then the attacker selects one seed (one device node) to spread the worms. This yields an extremely complex bilevel optimization problem. Our approach is to build a modified Column Generation framework for computing the optimal strategy effectively. The optimal response of the defender's problem is expressed as mixed-integer linear programming (MILPs). It is proved that the solution of the defender's optimal response is a NP-hard problem. Moreover, the optimal response of defenders is improved by an approximate algorithm--a greedy algorithm. Finally, the proposed scheme is tested on some randomly generated instances. The experimental results show that the scheme is effective for monitoring optimal scheduling.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks
    Wang, Tian
    Wu, Qun
    Wen, Sheng
    Cai, Yiqiao
    Tian, Hui
    Chen, Yonghong
    Wang, Baowei
    [J]. SENSORS, 2017, 17 (01)
  • [42] Wang Z, 2016, AAAI CONF ARTIF INTE, P637
  • [43] Modeling and Analysis on the Propagation Dynamics of Modern Email Malware
    Wen, Sheng
    Zhou, Wei
    Zhang, Jun
    Xiang, Yang
    Zhou, Wanlei
    Jia, Weijia
    Zou, Cliff C.
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (04) : 361 - 374
  • [44] Security Enhancement for IoT Communications Exposed to Eavesdroppers With Uncertain Locations
    Xu, Qian
    Ren, Pinyi
    Song, Houbing
    Du, Qinghe
    [J]. IEEE ACCESS, 2016, 4 : 2840 - 2853
  • [45] Yin Y, 2014, AAAI CONF ARTIF INTE, P826
  • [46] On early detection of strong infections in complex networks
    Yu, Yi
    Xiao, Gaoxi
    [J]. JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2014, 47 (06)
  • [47] A survey of intrusion detection in Internet of Things
    Zarpelao, Bruno Bogaz
    Miani, Rodrigo Sanches
    Kawakani, Claudio Toshio
    de Alvarenga, Sean Carlisto
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 84 : 25 - 37
  • [48] Zhang HL, 2015, IEEE ICC, P1152, DOI 10.1109/ICC.2015.7248478
  • [49] Early detection of dynamic harmful cascades in large-scale networks
    Zhou, Chuan
    Lu, Wei-Xue
    Zhang, Jingzun
    Li, Lei
    Hu, Yue
    Guo, Li
    [J]. JOURNAL OF COMPUTATIONAL SCIENCE, 2018, 28 : 304 - 317
  • [50] Zhu QY, 2012, IEEE DECIS CONTR P, P3404, DOI 10.1109/CDC.2012.6426481