Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach

被引:47
|
作者
Min, Minghui [1 ,2 ]
Xiao, Liang [1 ,2 ]
Xie, Caixia [1 ,2 ]
Hajimirsadeghi, Mohammad [3 ]
Mandayam, Narayan B. [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen 361005, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 211189, Jiangsu, Peoples R China
[3] Rutgers State Univ, Dept Elect & Comp Engn, Wireless Informat Network Lab, New Brunswick, NJ 08816 USA
来源
IEEE INTERNET OF THINGS JOURNAL | 2018年 / 5卷 / 06期
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Advanced persistent threats (APTs); central processing unit (CPU) allocation; cloud security; Colonel Blotto game (CBG); data protection level; reinforcement learning (RL);
D O I
10.1109/JIOT.2018.2844878
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced persistent threat (APT) attackers apply multiple sophisticated methods to continuously and stealthily steal information from the targeted cloud storage systems and can even induce the storage system to apply a specific defense strategy and attack it accordingly. In this paper, the interactions between an APT attacker and a defender allocating their central processing units (CPUs) over multiple storage devices in a cloud storage system are formulated as a Colonel Blotto game. The Nash equilibria of the CPU allocation game are derived for both symmetric and asymmetric CPUs between the APT attacker and the defender to evaluate how the limited CPU resources, the data storage size and the number of storage devices impact the expected data protection level and the utility of the cloud storage system. A CPU allocation scheme based on "hotbooting" policy hill-climbing that exploits the experiences in similar scenarios to initialize the quality values to accelerate the learning speed is proposed for the defender to achieve the optimal APT defense performance in the dynamic game without being aware of the APT attack model and the data storage model. A hotbooting deep Q-network-based CPU allocation scheme further improves the APT detection performance for the case with a large number of CPUs and storage devices. Simulation results show that our proposed reinforcement learning-based CPU allocation can improve both the data protection level and the utility of the cloud storage system compared with the Q-learning-based CPU allocation against APTs.
引用
收藏
页码:4250 / 4261
页数:12
相关论文
共 50 条
  • [41] A novel approach for detecting advanced persistent threats
    Al-Saraireh, Jaafer
    Masarweh, Ala'
    EGYPTIAN INFORMATICS JOURNAL, 2022, 23 (04) : 45 - 55
  • [42] Dynamic defense strategy against advanced persistent threat under heterogeneous networks
    Lv, Kun
    Chen, Yun
    Hu, Changzhen
    INFORMATION FUSION, 2019, 49 : 216 - 226
  • [43] Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems
    Huang, Linan
    Zhu, Quanyan
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 205 - 226
  • [44] Are Software Updates Useless against Advanced Persistent Threats?
    Massacci, Fabio
    Di Tizio, Giorgio
    COMMUNICATIONS OF THE ACM, 2023, 66 (01) : 31 - 33
  • [45] Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game
    Tian, Wen
    Du, Miao
    Ji, Xiaopeng
    Liu, Guangjie
    Dai, Yuewei
    Han, Zhu
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (24): : 17372 - 17381
  • [46] Stochastic Dynamic Information Flow Tracking game using supervised learning for detecting advanced persistent threats
    Moothedath, Shana
    Sahabandu, Dinuka
    Allen, Joey
    Bushnell, Linda
    Lee, Wenke
    Poovendran, Radha
    AUTOMATICA, 2024, 159
  • [47] Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey
    Gan, Chenquan
    Lin, Jiabin
    Huang, Da-Wen
    Zhu, Qingyi
    Tian, Liang
    MATHEMATICS, 2023, 11 (14)
  • [48] Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach
    Yang, Lu-Xing
    Li, Pengdeng
    Zhang, Yushu
    Yang, Xiaofan
    Xiang, Yong
    Zhou, Wanlei
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (07) : 1713 - 1728
  • [49] General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks
    Sengupta, Sailik
    Chowdhary, Ankur
    Huang, Dijiang
    Kambhampati, Subbarao
    DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 492 - 512
  • [50] Dynamic Defense against Adaptive and Persistent Adversaries
    Poovendran, Radha
    PROCEEDINGS OF THE 5TH ACM WORKSHOP ON MOVING TARGET DEFENSE (MTD'18), 2018, : 57 - 58