Equipment classification based differential game method for advanced persistent threats in Industrial Internet of Things

被引:2
|
作者
Gan, Chenquan [1 ,3 ]
Lin, Jiabin [1 ]
Huang, Da-Wen [2 ]
Zhu, Qingyi [3 ]
Tian, Liang [4 ]
Jain, Deepak Kumar [5 ,6 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
[2] Sichuan Normal Univ, Coll Comp Sci, Chengdu 610101, Peoples R China
[3] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
[4] Chongqing Univ Posts & Telecommun, Sch Comp Sci & Technol, Chongqing 400065, Peoples R China
[5] Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equipm, Minist Educ, Sch Artifcial lntelligence, Dalian 116024, Peoples R China
[6] Symbiosis Int Univ, Symbiosis Inst Technol, Pune 412115, India
关键词
Industrial Internet of Things; Advanced Persistent Threat; Equipment classification; Differential game; Nash equilibrium;
D O I
10.1016/j.eswa.2023.121255
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper is dedicated to solving the problem of Advanced Persistent Threat (APT) attack and defense in the Industrial Internet of Things (IIoT). Due to the diversity of IIoT equipment and the inconsistency of protection capabilities, it is difficult for the existing uniform defense strategy and the random defense strategy to achieve ideal results. Considering that both attackers and defenders aim to achieve maximum benefits by paying the minimum cost, as well as the differences between devices, this paper proposes an equipment classification based differential game method for APT in IIoT. Firstly, all equipment is divided into two categories according to their protective capabilities. Secondly, the APT attack and defense process is mathematically described, and the corresponding differential game problem is formulated and analyzed theoretically. Finally, the theoretical results of this method are verified by various experiments, including the comparisons with the uniform defense strategy, the random defense strategy, and the latest model.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game
    Tian, Wen
    Du, Miao
    Ji, Xiaopeng
    Liu, Guangjie
    Dai, Yuewei
    Han, Zhu
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (24): : 17372 - 17381
  • [2] Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey
    Gan, Chenquan
    Lin, Jiabin
    Huang, Da-Wen
    Zhu, Qingyi
    Tian, Liang
    MATHEMATICS, 2023, 11 (14)
  • [3] An Intelligent System to Detect Advanced Persistent Threats in Industrial Internet of Things (I-IoT)
    Javed, Safdar Hussain
    Ahmad, Maaz Bin
    Asif, Muhammad
    Almotiri, Sultan H.
    Masood, Khalid
    Ghamdi, Mohammad A. Al
    ELECTRONICS, 2022, 11 (05)
  • [4] Defense Against Advanced Persistent Threats with Expert System for Internet of Things
    Hu, Qing
    Lv, Shichao
    Shi, Zhiqiang
    Sun, Limin
    Xiao, Liang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 326 - 337
  • [5] Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game
    Halabi, Talal
    Wahab, Omar Abdel
    Al Mallah, Ranwa
    Zulkernine, Mohammad
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (03) : 970 - 985
  • [6] Defense of Advanced Persistent Threat on Industrial Internet of Things With Lateral Movement Modeling
    Bi, Jichao
    He, Shibo
    Luo, Fengji
    Meng, Wenchao
    Ji, Luyue
    Huang, Da-Wen
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (09) : 9619 - 9630
  • [7] An Adaptive Industrial Control Equipment Safety Fault Diagnosis Method in Industrial Internet of Things
    Zhang, Hanrui
    Li, Qianmu
    Meng, Shunmei
    Xu, Zhuoran
    Lv, Chaoxian
    Feng, Jingyu
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [8] On the Application of IOT (Internet of Things) for Securing Industrial Threats
    Usman, Muhammad
    Abbas, Nazar
    PROCEEDINGS OF 2014 12TH INTERNATIONAL CONFERENCE ON FRONTIERS OF INFORMATION TECHNOLOGY, 2014, : 37 - 40
  • [9] A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems
    Zhang, Lefeng
    Zhu, Tianqing
    Hussain, Farookh Khadeer
    Ye, Dayong
    Zhou, Wanlei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 1349 - 1364
  • [10] Anomaly classification in industrial Internet of things: A review
    Rodríguez M.
    Tobón D.P.
    Múnera D.
    Intelligent Systems with Applications, 2023, 18