Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach

被引:47
|
作者
Min, Minghui [1 ,2 ]
Xiao, Liang [1 ,2 ]
Xie, Caixia [1 ,2 ]
Hajimirsadeghi, Mohammad [3 ]
Mandayam, Narayan B. [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen 361005, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 211189, Jiangsu, Peoples R China
[3] Rutgers State Univ, Dept Elect & Comp Engn, Wireless Informat Network Lab, New Brunswick, NJ 08816 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 06期
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Advanced persistent threats (APTs); central processing unit (CPU) allocation; cloud security; Colonel Blotto game (CBG); data protection level; reinforcement learning (RL);
D O I
10.1109/JIOT.2018.2844878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) attackers apply multiple sophisticated methods to continuously and stealthily steal information from the targeted cloud storage systems and can even induce the storage system to apply a specific defense strategy and attack it accordingly. In this paper, the interactions between an APT attacker and a defender allocating their central processing units (CPUs) over multiple storage devices in a cloud storage system are formulated as a Colonel Blotto game. The Nash equilibria of the CPU allocation game are derived for both symmetric and asymmetric CPUs between the APT attacker and the defender to evaluate how the limited CPU resources, the data storage size and the number of storage devices impact the expected data protection level and the utility of the cloud storage system. A CPU allocation scheme based on "hotbooting" policy hill-climbing that exploits the experiences in similar scenarios to initialize the quality values to accelerate the learning speed is proposed for the defender to achieve the optimal APT defense performance in the dynamic game without being aware of the APT attack model and the data storage model. A hotbooting deep Q-network-based CPU allocation scheme further improves the APT detection performance for the case with a large number of CPUs and storage devices. Simulation results show that our proposed reinforcement learning-based CPU allocation can improve both the data protection level and the utility of the cloud storage system compared with the Q-learning-based CPU allocation against APTs.
引用
收藏
页码:4250 / 4261
页数:12
相关论文
共 50 条
  • [1] Defense Against Advanced Persistent Threats: A Colonel Blotto Game Approach
    Min, Minghui
    Xiao, Liang
    Xie, Caixia
    Hajimirsadeghi, Mohammad
    Mandayam, Narayan B.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,
  • [2] Cumulative Prospect Theoretic Study of A Cloud Storage Defense Game Against Advanced Persistent Threats
    Xu, Dongjin
    Xiao, Liang
    Mandayam, Narayan B.
    Poor, H. Vincent
    2017 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2017, : 541 - 546
  • [3] Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study
    Xiao, Liang
    Xu, Dongjin
    Xie, Caixia
    Mandayam, Narayan B.
    Poor, H. Vincent
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (03) : 534 - 544
  • [4] Prospect Theoretic Study of Cloud Storage Defense Against Advanced Persistent Threats
    Xu, Dongjin
    Li, Yanda
    Xiao, Liang
    Mandayam, Narayan B.
    Poor, H. Vincent
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [5] Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage
    Abass, Ahmed A. Alabdel
    Xiao, Liang
    Mandayam, Narayan B.
    Gajic, Zoran
    IEEE ACCESS, 2017, 5 : 8482 - 8491
  • [6] Stackelberg-Game-Based Defense Analysis Against Advanced Persistent Threats on Cloud Control System
    Yuan, Huanhuan
    Xia, Yuanqing
    Zhang, Jinhui
    Yang, Hongjiu
    Mahmoud, Magdi S.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (03) : 1571 - 1580
  • [7] On Dynamic Recovery of Cloud Storage System Under Advanced Persistent Threats
    Li, Pengdeng
    Yang, Xiaofan
    IEEE ACCESS, 2019, 7 : 103556 - 103569
  • [8] Dynamic Resource Management to Defend Against Advanced Persistent Threats in Fog Computing: A Game Theoretic Approach
    Feng, Shaohan
    Xiong, Zehui
    Niyato, Dusit
    Wang, Ping
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2021, 9 (03) : 995 - 1007
  • [9] Bandit Learning for Dynamic Colonel Blotto Game with a Budget Constraint
    Leon, Vincent
    Etesami, S. Rasoul
    2021 60TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2021, : 3818 - 3823
  • [10] Defense Against Advanced Persistent Threats in Smart Grids: A Reinforcement Learning Approach
    Ning, Baifeng
    Xiao, Liang
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 8598 - 8603