Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach

被引:47
|
作者
Min, Minghui [1 ,2 ]
Xiao, Liang [1 ,2 ]
Xie, Caixia [1 ,2 ]
Hajimirsadeghi, Mohammad [3 ]
Mandayam, Narayan B. [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen 361005, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 211189, Jiangsu, Peoples R China
[3] Rutgers State Univ, Dept Elect & Comp Engn, Wireless Informat Network Lab, New Brunswick, NJ 08816 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 06期
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Advanced persistent threats (APTs); central processing unit (CPU) allocation; cloud security; Colonel Blotto game (CBG); data protection level; reinforcement learning (RL);
D O I
10.1109/JIOT.2018.2844878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) attackers apply multiple sophisticated methods to continuously and stealthily steal information from the targeted cloud storage systems and can even induce the storage system to apply a specific defense strategy and attack it accordingly. In this paper, the interactions between an APT attacker and a defender allocating their central processing units (CPUs) over multiple storage devices in a cloud storage system are formulated as a Colonel Blotto game. The Nash equilibria of the CPU allocation game are derived for both symmetric and asymmetric CPUs between the APT attacker and the defender to evaluate how the limited CPU resources, the data storage size and the number of storage devices impact the expected data protection level and the utility of the cloud storage system. A CPU allocation scheme based on "hotbooting" policy hill-climbing that exploits the experiences in similar scenarios to initialize the quality values to accelerate the learning speed is proposed for the defender to achieve the optimal APT defense performance in the dynamic game without being aware of the APT attack model and the data storage model. A hotbooting deep Q-network-based CPU allocation scheme further improves the APT detection performance for the case with a large number of CPUs and storage devices. Simulation results show that our proposed reinforcement learning-based CPU allocation can improve both the data protection level and the utility of the cloud storage system compared with the Q-learning-based CPU allocation against APTs.
引用
收藏
页码:4250 / 4261
页数:12
相关论文
共 50 条
  • [21] Defending Against Advanced Persistent Threats Using Game-Theory
    Rass, Stefan
    Koenig, Sandra
    Schauer, Stefan
    PLOS ONE, 2017, 12 (01):
  • [22] Optimal Power Allocation Strategy Against Jamming Attacks Using the Colonel Blotto Game
    Wu, Yongle
    Wang, Beibei
    Liu, K. J. Ray
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 4203 - 4207
  • [23] Recent Developments in Game-Theory Approaches for the Detection and Defense against Advanced Persistent Threats (APTs): A Systematic Review
    Khalid, Mohd Nor Akmal
    Al-Kadhimi, Amjed Ahmed
    Singh, Manmeet Mahinderjit
    MATHEMATICS, 2023, 11 (06)
  • [24] GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats
    Rass, Stefan
    Zhu, Quanyan
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 314 - 326
  • [25] Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis
    Acquaviva, Jeffrey
    Mahon, Mark
    Einfalt, Bruce
    LaPorta, Tom
    2017 IEEE 36TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2017, : 204 - 213
  • [26] A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multistage Advanced Persistent Threats
    Moothedath, Shana
    Sahabandu, Dinuka
    Allen, Joey
    Clark, Andrew
    Bushnell, Linda
    Lee, Wenke
    Poovendran, Radha
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2020, 65 (12) : 5248 - 5263
  • [27] Defense scheme against advanced persistent threats in mobile fog computing security
    Waqas, Muhammad
    Tu, Shanshan
    Wan, Jialin
    Mir, Talha
    Alasmary, Hisham
    Abbas, Ghulam
    COMPUTER NETWORKS, 2023, 221
  • [28] Protecting the Internet of Vehicles Against Advanced Persistent Threats: A Bayesian Stackelberg Game
    Halabi, Talal
    Wahab, Omar Abdel
    Al Mallah, Ranwa
    Zulkernine, Mohammad
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (03) : 970 - 985
  • [29] Attacker-Centric View of a Detection Game against Advanced Persistent Threats
    Xiao, Liang
    Xu, Dongjin
    Mandayam, Narayan B.
    Poor, H. Vincent
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (11) : 2512 - 2523
  • [30] Dynamic Defense Strategy against Advanced Persistent Threat with Insiders
    Hu, Pengfei
    Li, Hongxing
    Fu, Hao
    Cansever, Derya
    Mohapatra, Prasant
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,