Dynamic threshold strategy optimization for security protection in Internet of Things: An adversarial deep learning-based game-theoretical approach

被引:1
|
作者
Chen, Lili [1 ,2 ,3 ]
Wang, Zhen [2 ,3 ]
Wu, Jintao [3 ]
Guo, Yunchuan [2 ,4 ]
Li, Fenghua [2 ,4 ]
Li, Zifu [2 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[3] Hangzhou Dianzi Univ, Sch Cyberspace, Hangzhou, Peoples R China
[4] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
adversarial deep learning; dynamic threshold; game-theoretical; IoT; mobile edge computing; INTRUSION-DETECTION; FRAMEWORK;
D O I
10.1002/cpe.6944
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As mobile communications, the Internet, databases, distributed computing, and other technologies continue to develop, the Internet of Things (IoT) has emerged as prevalent technique. However, attacks on security and sensitive data in IoT occur frequently, and these attacks often evade intrusion detection systems strategically by mutating their traffic. To prevent security threats and sensitive data leakage, we propose a game approach based on adversarial deep learning to optimize a dynamic security threshold strategy. We introduce a mobile edge computing framework and utilize a game model to describe the adversarial interaction between the two participants. To solve the complexity of the game problem to gain dynamically randomized adversarial attacks, we present a column generation (CG) framework, which uses a feedforward neural network to quantify data flowing through IoT devices. Considering the limited resources of IoT devices, we calculate an optimal response to cyberattacks via a particle swarm optimization algorithm, aiming to reduce the false alarm rate. The adversarial dynamic threshold (ADT)-based column generation (CG-ADT) algorithm generates the set of detection threshold and the probability. Finally, we present the results of experiments conducted to demonstrate the effectiveness and robustness of the proposed dynamic threshold scheme for sensitive data security protection in IoT and its suitability for implementation in production systems.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks
    Weerasinghe, Sandamal
    Alpcan, Tansu
    Erfani, Sarah M.
    Leckie, Christopher
    Pourbeik, Peyam
    Riddle, Jack
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 386 - 397
  • [2] A Deep Reinforcement Learning-Based Caching Strategy for Internet of Things
    Nasehzadeh, Ali
    Wang, Ping
    2020 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2020, : 969 - 974
  • [3] Security defense strategy algorithm for Internet of Things based on deep reinforcement learning
    Feng, Xuecai
    Han, Jikai
    Zhang, Rui
    Xu, Shuo
    Xia, Hui
    HIGH-CONFIDENCE COMPUTING, 2024, 4 (01):
  • [4] Integrating Ebola optimization search algorithm for enhanced deep learning-based ransomware detection in Internet of Things security
    Alzahrani, Ibrahim R.
    Allafi, Randa
    AIMS MATHEMATICS, 2024, 9 (03): : 6784 - 6802
  • [5] Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things
    Ferdowsi, Aidin
    Saad, Walid
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [6] Deep learning-based intrusion detection approach for securing industrial Internet of Things
    Soliman, Sahar
    Oudah, Wed
    Aljuhani, Ahamed
    ALEXANDRIA ENGINEERING JOURNAL, 2023, 81 : 371 - 383
  • [7] Security, Trust, and Privacy in Machine Learning-Based Internet of Things
    Meng, Weizhi
    Li, Wenjuan
    Han, Jinguang
    Su, Chunhua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [8] Security, Trust, and Privacy in Machine Learning-Based Internet of Things
    Meng, Weizhi
    Li, Wenjuan
    Han, Jinguang
    Su, Chunhua
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] Analyzing the blockchain mining strategy in Industrial Internet of Things: A game theoretical approach
    Chen, Zhuo
    Liu, Zhe
    Zhou, Yang
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 159 : 51 - 63
  • [10] A Deep Learning-Based DDoS Detection Framework for Internet of Things
    Ma, Li
    Chai, Ying
    Cui, Lei
    Ma, Dongchao
    Fu, Yingxun
    Xiao, Ailing
    ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2020,