Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach

被引:47
|
作者
Min, Minghui [1 ,2 ]
Xiao, Liang [1 ,2 ]
Xie, Caixia [1 ,2 ]
Hajimirsadeghi, Mohammad [3 ]
Mandayam, Narayan B. [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen 361005, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 211189, Jiangsu, Peoples R China
[3] Rutgers State Univ, Dept Elect & Comp Engn, Wireless Informat Network Lab, New Brunswick, NJ 08816 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 06期
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Advanced persistent threats (APTs); central processing unit (CPU) allocation; cloud security; Colonel Blotto game (CBG); data protection level; reinforcement learning (RL);
D O I
10.1109/JIOT.2018.2844878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) attackers apply multiple sophisticated methods to continuously and stealthily steal information from the targeted cloud storage systems and can even induce the storage system to apply a specific defense strategy and attack it accordingly. In this paper, the interactions between an APT attacker and a defender allocating their central processing units (CPUs) over multiple storage devices in a cloud storage system are formulated as a Colonel Blotto game. The Nash equilibria of the CPU allocation game are derived for both symmetric and asymmetric CPUs between the APT attacker and the defender to evaluate how the limited CPU resources, the data storage size and the number of storage devices impact the expected data protection level and the utility of the cloud storage system. A CPU allocation scheme based on "hotbooting" policy hill-climbing that exploits the experiences in similar scenarios to initialize the quality values to accelerate the learning speed is proposed for the defender to achieve the optimal APT defense performance in the dynamic game without being aware of the APT attack model and the data storage model. A hotbooting deep Q-network-based CPU allocation scheme further improves the APT detection performance for the case with a large number of CPUs and storage devices. Simulation results show that our proposed reinforcement learning-based CPU allocation can improve both the data protection level and the utility of the cloud storage system compared with the Q-learning-based CPU allocation against APTs.
引用
收藏
页码:4250 / 4261
页数:12
相关论文
共 50 条
  • [11] Explainable Intelligence-Driven Defense Mechanism Against Advanced Persistent Threats: A Joint Edge Game and AI Approach
    Li, Huiling
    Wu, Jun
    Xu, Hansong
    Li, Gaolei
    Guizani, Mohsen
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (02) : 757 - 775
  • [12] A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems
    Huang, Linan
    Zhu, Quanyan
    COMPUTERS & SECURITY, 2020, 89
  • [13] A Dynamic Colonel Blotto Game Model for Spectrum Sharing in Wireless Networks
    Hajimirsaadeghi, Mohammad
    Mandayam, Narayan B.
    2017 55TH ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2017, : 287 - 294
  • [14] Dynamic Information Flow Tracking for Detection of Advanced Persistent Threats: A Stochastic Game Approach
    Moothedath, Shana
    Sahabandu, Dinuka
    Allen, Joey
    Clark, Andrew
    Bushnell, Linda
    Lee, Wenke
    Poovendran, Radha
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (10) : 6684 - 6699
  • [15] Inter-Network Dynamic Spectrum Allocation Via a Colonel Blotto Game
    Hajimirsadeghi, Mohammad
    Sridharan, Gokul
    Saadt, Walid
    Mandayam, Narayan B.
    2016 ANNUAL CONFERENCE ON INFORMATION SCIENCE AND SYSTEMS (CISS), 2016,
  • [16] Advanced Persistent Threats - Detection and Defense
    Vukalovic, J.
    Delija, D.
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1324 - 1330
  • [17] Moving Target Defense against Advanced Persistent Threats for Cybersecurity Enhancement
    Khosravi-Farmad, Masoud
    Ramaki, Ali Ahmadian
    Bafghi, Abbas Ghaemi
    2018 8TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2018, : 280 - 285
  • [18] Defense Against Advanced Persistent Threats with Expert System for Internet of Things
    Hu, Qing
    Lv, Shichao
    Shi, Zhiqiang
    Sun, Limin
    Xiao, Liang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 : 326 - 337
  • [19] Multi-layered Defense against Advanced Persistent Threats (APT)
    Torii, Satoru
    Morinaga, Masanobu
    Yoshioka, Takashi
    Terada, Takeaki
    Unno, Yuki
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2014, 50 (01): : 52 - 59
  • [20] Colonel Blotto Game Aided Attack-Defense Analysis in Real-World Networks
    Guan, Sanghai
    Wang, Jingling
    Jiang, Chunxiao
    Han, Zhu
    Ren, Yong
    Benslimane, Abderrahim
    2018 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2018,