Equipment classification based differential game method for advanced persistent threats in Industrial Internet of Things

被引:2
|
作者
Gan, Chenquan [1 ,3 ]
Lin, Jiabin [1 ]
Huang, Da-Wen [2 ]
Zhu, Qingyi [3 ]
Tian, Liang [4 ]
Jain, Deepak Kumar [5 ,6 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
[2] Sichuan Normal Univ, Coll Comp Sci, Chengdu 610101, Peoples R China
[3] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
[4] Chongqing Univ Posts & Telecommun, Sch Comp Sci & Technol, Chongqing 400065, Peoples R China
[5] Dalian Univ Technol, Key Lab Intelligent Control & Optimizat Ind Equipm, Minist Educ, Sch Artifcial lntelligence, Dalian 116024, Peoples R China
[6] Symbiosis Int Univ, Symbiosis Inst Technol, Pune 412115, India
关键词
Industrial Internet of Things; Advanced Persistent Threat; Equipment classification; Differential game; Nash equilibrium;
D O I
10.1016/j.eswa.2023.121255
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper is dedicated to solving the problem of Advanced Persistent Threat (APT) attack and defense in the Industrial Internet of Things (IIoT). Due to the diversity of IIoT equipment and the inconsistency of protection capabilities, it is difficult for the existing uniform defense strategy and the random defense strategy to achieve ideal results. Considering that both attackers and defenders aim to achieve maximum benefits by paying the minimum cost, as well as the differences between devices, this paper proposes an equipment classification based differential game method for APT in IIoT. Firstly, all equipment is divided into two categories according to their protective capabilities. Secondly, the APT attack and defense process is mathematically described, and the corresponding differential game problem is formulated and analyzed theoretically. Finally, the theoretical results of this method are verified by various experiments, including the comparisons with the uniform defense strategy, the random defense strategy, and the latest model.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Security of the Internet of Things Based on Game Algorithm
    Yi, Yue-e
    INTERNATIONAL JOURNAL OF ONLINE ENGINEERING, 2018, 14 (08) : 80 - 93
  • [32] A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things
    Alnajim, Abdullah M.
    Habib, Shabana
    Islam, Muhammad
    Thwin, Su Myat
    Alotaibi, Faisal
    Mahmoud, Mohammed
    TECHNOLOGIES, 2023, 11 (06)
  • [33] A Game Theory Based Collaborative Security Detection Method for Internet of Things Systems
    Wu, Hao
    Wang, Wei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (06) : 1432 - 1445
  • [34] Deep Learning Based Device Classification Method for Safeguarding Internet of Things
    Luo, Yantian
    Chen, Xu
    Ge, Ning
    Lu, Jianhua
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [35] Catching Escapers: A Detection Method for Advanced Persistent Escapers in Industry Internet of Things Based on Identity-based Broadcast Encryption (IBBE)
    Sha, Le-Tian
    Xiao, Fu
    Huang, Hai-Ping
    Chen, Yu
    Wang, Ru-Chuan
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (03)
  • [36] Profits distribution of operators led internet of things industrial value chain based on game theory
    Lv, X. (lvxiyan@bjtu.edu.cn), 1600, Advanced Institute of Convergence Information Technology, Myoungbo Bldg 3F,, Bumin-dong 1-ga, Seo-gu, Busan, 602-816, Korea, Republic of (04):
  • [37] Game-Theoretic Resource Allocation for Fog-Based Industrial Internet of Things Environment
    Jie, Yingmo
    Guo, Cheng
    Choo, Kim-Kwang Raymond
    Liu, Charles Zhechao
    Li, Mingchu
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) : 3041 - 3052
  • [38] Joint Differential Game and Double Deep Q-Networks for Suppressing Malware Spread in Industrial Internet of Things
    Shen, Shigen
    Xie, Lanlan
    Zhang, Yanchun
    Wu, Guowen
    Zhang, Hong
    Yu, Shui
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5302 - 5315
  • [39] Stackelberg-Game-Based Defense Analysis Against Advanced Persistent Threats on Cloud Control System
    Yuan, Huanhuan
    Xia, Yuanqing
    Zhang, Jinhui
    Yang, Hongjiu
    Mahmoud, Magdi S.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 1571 - 1580
  • [40] Quickest Detection of Advanced Persistent Threats: A Semi-Markov Game Approach
    Sahabandu, Dinuka
    Allen, Joey
    Moothedath, Shana
    Bushnell, Linda
    Lee, Wenke
    Poovendran, Radha
    2020 ACM/IEEE 11TH INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2020), 2020, : 9 - 19