A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing

Fog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog comput...

Full description

Bibliographic Details
Main Authors: Xingshuo An, Fuhong Lin, Shenggang Xu, Li Miao, Chao Gong
Format: Article
Language:English
Published: Hindawi-Wiley 2018-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2018/1821804
id doaj-da044063ae96443982b518a705b89eed
record_format Article
spelling doaj-da044063ae96443982b518a705b89eed2020-11-25T00:53:35ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222018-01-01201810.1155/2018/18218041821804A Novel Differential Game Model-Based Intrusion Response Strategy in Fog ComputingXingshuo An0Fuhong Lin1Shenggang Xu2Li Miao3Chao Gong4School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing 100083, ChinaFog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog computing. We have introduced a fog computing IDS (FC-IDS) framework in our previous work. In this paper, we study the optimal intrusion response strategy in fog computing based on the FC-IDS scheme proposed in our previous work. We postulate the intrusion process in fog computing and describe it with a mathematical model based on differential game theory. According to this model, the optimal response strategy is obtained corresponding to the optimal intrusion strategy. Theoretical analysis and simulation results demonstrate that our security model can effectively stabilize the intrusion frequency of the invaders in fog computing.http://dx.doi.org/10.1155/2018/1821804
collection DOAJ
language English
format Article
sources DOAJ
author Xingshuo An
Fuhong Lin
Shenggang Xu
Li Miao
Chao Gong
spellingShingle Xingshuo An
Fuhong Lin
Shenggang Xu
Li Miao
Chao Gong
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
Security and Communication Networks
author_facet Xingshuo An
Fuhong Lin
Shenggang Xu
Li Miao
Chao Gong
author_sort Xingshuo An
title A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
title_short A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
title_full A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
title_fullStr A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
title_full_unstemmed A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
title_sort novel differential game model-based intrusion response strategy in fog computing
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2018-01-01
description Fog computing is an emerging network paradigm. Due to its characteristics (e.g., geo-location and constrained resource), fog computing is subject to a broad range of security threats. Intrusion detection system (IDS) is an essential security technology to deal with the security threats in fog computing. We have introduced a fog computing IDS (FC-IDS) framework in our previous work. In this paper, we study the optimal intrusion response strategy in fog computing based on the FC-IDS scheme proposed in our previous work. We postulate the intrusion process in fog computing and describe it with a mathematical model based on differential game theory. According to this model, the optimal response strategy is obtained corresponding to the optimal intrusion strategy. Theoretical analysis and simulation results demonstrate that our security model can effectively stabilize the intrusion frequency of the invaders in fog computing.
url http://dx.doi.org/10.1155/2018/1821804
work_keys_str_mv AT xingshuoan anoveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing
AT fuhonglin anoveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing
AT shenggangxu anoveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing
AT limiao anoveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing
AT chaogong anoveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing
AT xingshuoan noveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing
AT fuhonglin noveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing
AT shenggangxu noveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing
AT limiao noveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing
AT chaogong noveldifferentialgamemodelbasedintrusionresponsestrategyinfogcomputing
_version_ 1725237487782068224