A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing

被引:16
作者
An, Xingshuo [1 ]
Lin, Fuhong [1 ]
Xu, Shenggang [1 ]
Miao, Li [1 ]
Gong, Chao [1 ]
机构
[1] USTB, Sch Comp & Commun Engn, Beijing 100083, Peoples R China
基金
美国国家科学基金会; 国家重点研发计划;
关键词
Intrusion detection - Fog - Game theory - Network security - Security systems - Computation theory - Computer games;
D O I
10.1155/2018/1821804
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Fog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog computing. We have introduced a fog computing IDS (FC-IDS) framework in our previous work. In this paper, we study the optimal intrusion response strategy in fog computing based on the FC-IDS scheme proposed in our previous work. We postulate the intrusion process in fog computing and describe it with a mathematical model based on differential game theory. According to this model, the optimal response strategy is obtained corresponding to the optimal intrusion strategy. Theoretical analysis and simulation results demonstrate that our security model can effectively stabilize the intrusion frequency of the invaders in fog computing.
引用
收藏
页数:9
相关论文
共 18 条
[1]  
Abbasi B.Z., 2017, 2017 23 INT C AUTOMA, P1
[2]   Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC [J].
An, Xingshuo ;
Zhou, Xianwei ;
Lu, Xing ;
Lin, Fuhong ;
Yang, Lei .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2018,
[3]  
[Anonymous], 2007, INT J INFORM COMPUTE, DOI DOI 10.1504/IJICS.2007.012248
[4]  
Bonomi F., 2012, P MCCWORKSHOP MOB CL, P13, DOI 10.1145/2342509.2342513
[5]  
Denning D. E., 2016, IEEE S SEC PRIV
[6]   MODEL OF DUOPOLY SUGGESTING A THEORY OF ENTRY BARRIERS [J].
DIXIT, A .
BELL JOURNAL OF ECONOMICS, 1979, 10 (01) :20-32
[7]  
Guo Y. B., 2005, SYSTEM ENG ELECT
[8]  
Huo Y., 2018, WIREL COMMUN MOB COM, P1
[9]   JAMMING STRATEGIES FOR PHYSICAL LAYER SECURITY [J].
Huo, Yan ;
Tian, Yuqi ;
Ma, Liran ;
Cheng, Xiuzhen ;
Jing, Tao .
IEEE WIRELESS COMMUNICATIONS, 2018, 25 (01) :148-153
[10]   LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing [J].
Huo, Yan ;
Hu, Chunqiang ;
Qi, Xiaowei ;
Jing, Tao .
IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05) :1117-1124