Cumulative Prospect Theoretic Study of A Cloud Storage Defense Game Against Advanced Persistent Threats

被引:0
|
作者
Xu, Dongjin [1 ]
Xiao, Liang [1 ]
Mandayam, Narayan B. [2 ]
Poor, H. Vincent [3 ]
机构
[1] Xiamen Univ, Dept Commun Engn, Xiamen, Peoples R China
[2] Rutgers State Univ, WINLAB, Dept Elect & Comp Engn, Piscataway, NJ USA
[3] Princeton Univ, Dept Elect Engn, Princeton, NJ 08544 USA
基金
美国国家科学基金会;
关键词
Cloud storage; advanced persistent threat; game theory; cumulative prospect theory;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cloud storage is vulnerable to advanced persistent threats (APTs), in which an attacker launches stealthy, continuous, well-funded and targeted attacks on storage devices. In this paper, cumulative prospect theory (CPT) is applied to study the interactions between a defender of cloud storage and an APT attacker when each of them makes subjective decisions to choose the scan interval and attack interval, respectively. Both the probability weighting effect and the framing effect are applied to model the deviation of subjective decisions of end-users from the objective decisions governed by expected utility theory, under uncertain attack durations. Cumulative decision weights are used to describe the probability weighting effect and the value distortion functions are used to represent the framing effect of subjective APT attackers and defenders in the CPT-based APT defense game, rather than discrete decision weights, as in earlier prospect theoretic study of APT defense. The Nash equilibria of the CPT-based APT defense game are derived, showing that a subjective attacker becomes risk-seeking if the frame of reference for evaluating the utility is large, and becomes risk-averse if the frame of reference for evaluating the utility is small.
引用
收藏
页码:541 / 546
页数:6
相关论文
共 50 条
  • [41] Securing Cloud Infrastructure Against Co-Resident DoS Attacks Using Game Theoretic Defense Mechanisms
    Bedi, Harkeerat Singh
    Shiva, Sajjan
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 463 - 469
  • [42] Advanced Persistent Threats and Their Defense Methods in Industrial Internet of Things: A Survey
    Gan, Chenquan
    Lin, Jiabin
    Huang, Da-Wen
    Zhu, Qingyi
    Tian, Liang
    MATHEMATICS, 2023, 11 (14)
  • [43] General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks
    Sengupta, Sailik
    Chowdhary, Ankur
    Huang, Dijiang
    Kambhampati, Subbarao
    DECISION AND GAME THEORY FOR SECURITY, 2019, 11836 : 492 - 512
  • [44] A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems
    Huang, Linan
    Zhu, Quanyan
    COMPUTERS & SECURITY, 2020, 89
  • [45] ON EFFECTIVENESS OF GAME THEORETIC MODELING AND ANALYSIS AGAINST CYBER THREATS FOR AVIONIC SYSTEMS
    Shen, Dan
    Wei, Sixiao
    Chen, Genshe
    Pham, Khanh
    Blasch, Erik
    Yu, Wei
    Zhang, Hanlin
    Cruz, Jose B.
    2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [46] ON EFFECTIVENESS OF GAME THEORETIC MODELING AND ANALYSIS AGAINST CYBER THREATS FOR AVIONIC SYSTEMS
    Wei, Sixiao
    Shen, Dan
    Chen, Genshe
    Zhang, Hanlin
    Yu, Wei
    Blasch, Erik
    Pham, Khanh
    Cruz, Jose B.
    2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
  • [47] Stackelberg games for modeling defense scenarios against cloud security threats
    Jakobik, Agnieszka
    Palmieri, Francesco
    Kolodziej, Joanna
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 110 : 99 - 107
  • [48] A Game-Theoretic Model for Defense of an Oceanic Bastion Against Submarines
    Brown, Gerald
    Kline, Jeff
    Thomas, Adam
    Washburn, Alan
    Wood, Kevin
    MILITARY OPERATIONS RESEARCH, 2011, 16 (04): : 25 - 40
  • [49] GAIT: A Game-Theoretic Defense Against Intellectual Property Theft
    Zhang, Youzhi
    Chen, Dongkai
    Jajodia, Sushil
    Pugliese, Andrea
    Subrahmanian, V. S.
    Xiong, Yanhai
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (04) : 1967 - 1980
  • [50] A Game-Theoretic Analysis to Resolve the Tussle in Cloud Storage Services
    Yang, Libin
    Cai, Xiaoyan
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (03): : 1361 - 1367