Cumulative Prospect Theoretic Study of A Cloud Storage Defense Game Against Advanced Persistent Threats

被引:0
|
作者
Xu, Dongjin [1 ]
Xiao, Liang [1 ]
Mandayam, Narayan B. [2 ]
Poor, H. Vincent [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen, Peoples R China
[2] Rutgers State Univ, WINLAB, Dept Elect & Comp Engn, Piscataway, NJ USA
[3] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Cloud storage; advanced persistent threat; game theory; cumulative prospect theory;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud storage is vulnerable to advanced persistent threats (APTs), in which an attacker launches stealthy, continuous, well-funded and targeted attacks on storage devices. In this paper, cumulative prospect theory (CPT) is applied to study the interactions between a defender of cloud storage and an APT attacker when each of them makes subjective decisions to choose the scan interval and attack interval, respectively. Both the probability weighting effect and the framing effect are applied to model the deviation of subjective decisions of end-users from the objective decisions governed by expected utility theory, under uncertain attack durations. Cumulative decision weights are used to describe the probability weighting effect and the value distortion functions are used to represent the framing effect of subjective APT attackers and defenders in the CPT-based APT defense game, rather than discrete decision weights, as in earlier prospect theoretic study of APT defense. The Nash equilibria of the CPT-based APT defense game are derived, showing that a subjective attacker becomes risk-seeking if the frame of reference for evaluating the utility is large, and becomes risk-averse if the frame of reference for evaluating the utility is small.
引用
收藏
页码:541 / 546
页数:6
相关论文
共 50 条
  • [31] Game Theoretic Defense Framework Against Sybil Attacks
    Bhupender Kumar
    Bubu Bhuyan
    SN Computer Science, 5 (7)
  • [32] SECaaS-Based Partially Observable Defense Model for IIoT Against Advanced Persistent Threats
    Zhang, Zikai
    Ding, Chuntao
    Li, Yidong
    Yu, Jinhui
    Li, Jingyi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 4267 - 4280
  • [33] Deception Maze: A Stackelberg Game-Theoretic Defense Mechanism for Intranet Threats
    Liu, Jieling
    Wang, Zhiliang
    Yang, Jiahai
    Wang, Bo
    He, Lin
    Song, Guanglei
    Liu, Xinran
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2021), 2021,
  • [34] Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats
    Chen, Ziqin
    Chen, Guanpu
    Hong, Yiguang
    UNMANNED SYSTEMS, 2024, 12 (02) : 341 - 358
  • [35] A Practical Study on Advanced Persistent Threats
    Jeun, Inkyung
    Lee, Youngsook
    Won, Dongho
    COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 144 - +
  • [36] Analysis and Computation of Adaptive Defense Strategies Against Advanced Persistent Threats for Cyber-Physical Systems
    Huang, Linan
    Zhu, Quanyan
    DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2018, 2018, 11199 : 205 - 226
  • [37] Cyber-threats Information Sharing in Cloud Computing: A game Theoretic Approach
    Kamhoua, Charles
    Martin, Andrew
    Tosh, Deepak K.
    Kwiat, Kevin A.
    Heitzenrater, Chad
    Sengupta, Shamik
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 382 - 389
  • [38] Are Software Updates Useless against Advanced Persistent Threats?
    Massacci, Fabio
    Di Tizio, Giorgio
    COMMUNICATIONS OF THE ACM, 2023, 66 (01) : 31 - 33
  • [39] METHODOLOGIES FOR EVALUATING GAME THEORETIC DEFENSE AGAINST DDOS ATTACKS
    Khirwadkar, Tanmay
    Nguyen, Kien C.
    Nicol, David M.
    Basar, Tamer
    PROCEEDINGS OF THE 2010 WINTER SIMULATION CONFERENCE, 2010, : 697 - 707
  • [40] A Cooperative Game-Theoretic Model in Cloud Storage Auditing
    Lin, Chung-Yi
    Tzeng, Wen-Guey
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2020, 36 (01) : 127 - 143