A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
Fog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog comput...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2018-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2018/1821804 |
id |
doaj-da044063ae96443982b518a705b89eed |
---|---|
record_format |
Article |
spelling |
doaj-da044063ae96443982b518a705b89eed2020-11-25T00:53:35ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/18218041821804A Novel Differential Game Model-Based Intrusion Response Strategy in Fog ComputingXingshuo An0Fuhong Lin1Shenggang Xu2Li Miao3Chao Gong4School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, ChinaFog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog computing. We have introduced a fog computing IDS (FC-IDS) framework in our previous work. In this paper, we study the optimal intrusion response strategy in fog computing based on the FC-IDS scheme proposed in our previous work. We postulate the intrusion process in fog computing and describe it with a mathematical model based on differential game theory. According to this model, the optimal response strategy is obtained corresponding to the optimal intrusion strategy. Theoretical analysis and simulation results demonstrate that our security model can effectively stabilize the intrusion frequency of the invaders in fog computing.http://dx.doi.org/10.1155/2018/1821804 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Xingshuo An Fuhong Lin Shenggang Xu Li Miao Chao Gong |
spellingShingle |
Xingshuo An Fuhong Lin Shenggang Xu Li Miao Chao Gong A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing Security and Communication Networks |
author_facet |
Xingshuo An Fuhong Lin Shenggang Xu Li Miao Chao Gong |
author_sort |
Xingshuo An |
title |
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing |
title_short |
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing |
title_full |
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing |
title_fullStr |
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing |
title_full_unstemmed |
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing |
title_sort |
novel differential game model-based intrusion response strategy in fog computing |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2018-01-01 |
description |
Fog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog computing. We have introduced a fog computing IDS (FC-IDS) framework in our previous work. In this paper, we study the optimal intrusion response strategy in fog computing based on the FC-IDS scheme proposed in our previous work. We postulate the intrusion process in fog computing and describe it with a mathematical model based on differential game theory. According to this model, the optimal response strategy is obtained corresponding to the optimal intrusion strategy. Theoretical analysis and simulation results demonstrate that our security model can effectively stabilize the intrusion frequency of the invaders in fog computing. |
url |
http://dx.doi.org/10.1155/2018/1821804 |
work_keys_str_mv |
AT xingshuoan anoveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing AT fuhonglin anoveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing AT shenggangxu anoveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing AT limiao anoveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing AT chaogong anoveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing AT xingshuoan noveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing AT fuhonglin noveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing AT shenggangxu noveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing AT limiao noveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing AT chaogong noveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing |
_version_ |
1725237487782068224 |