Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage

被引:33
|
作者
Abass, Ahmed A. Alabdel [1 ,2 ]
Xiao, Liang [3 ]
Mandayam, Narayan B. [2 ]
Gajic, Zoran [2 ]
机构
[1] Univ Thiqar, Dept Elect Engn, Nasiriyah, Iraq
[2] Rutgers State Univ, Dept Elect & Comp Engn, Wireless Informat Network Lab, New Brunswick, NJ 08816 USA
[3] Xiamen Univ, Dept Commun Engn, Xiamen, Peoples R China
来源
IEEE ACCESS | 2017年 / 5卷
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Evolutionary game theory; advanced persistent threats; cloud storage; replicator dynamics;
D O I
10.1109/ACCESS.2017.2691326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced Persistent Threats (APTs) represent stealthy, powerful, long-term, and well-funded attacks against cyber systems, such as data centers and cloud storage. Evolutionary game theory is used to capture the long-term continuous behavior of the APTs on the cloud storage devices. Two APT defense games with discrete strategies are formulated, in which both an APT attacker and a defender compete to control one or multiple storage devices regarding their attack or defense intervals. The dynamical stability of each defense and attack strategy pair is studied according to the replicator dynamics criteria to characterize the locally asymptotically stable equilibrium strategies. The evolutionary stable strategy is discussed in each game, which is a subset of the asymptotically stable Nash equilibrium (NE). The phase portraits provide the locally asymptotically stable points of the APT defense game, which represent the NE showing the relationship between the asymptotic stability and evolutionary stability.
引用
收藏
页码:8482 / 8491
页数:10
相关论文
共 50 条
  • [21] Game Theoretic Risk Analysis of Security Threats
    Li, J.
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2010, 61 (12) : 1795 - 1795
  • [22] A Game-theoretic Analysis of Hybrid Threats
    Balcaen, Pieter
    Bois, Cind Du
    Buts, Caroline
    DEFENCE AND PEACE ECONOMICS, 2022, 33 (01) : 26 - 41
  • [23] Game-theoretic modeling and analysis of insider threats
    Liu, Debin
    Wang, XiaoFeng
    Camp, Jean
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2008, 1 : 75 - 80
  • [24] Optimal Cyber-Defense Strategies for Advanced Persistent Threats: A Game Theoretical Analysis
    Acquaviva, Jeffrey
    Mahon, Mark
    Einfalt, Bruce
    LaPorta, Tom
    2017 IEEE 36TH INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2017, : 204 - 213
  • [25] Cyber-threats Information Sharing in Cloud Computing: A game Theoretic Approach
    Kamhoua, Charles
    Martin, Andrew
    Tosh, Deepak K.
    Kwiat, Kevin A.
    Heitzenrater, Chad
    Sengupta, Shamik
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 382 - 389
  • [26] Flow Based Analysis of Advanced Persistent Threats Detecting Targeted Attacks in Cloud Computing
    Vance, Andrew
    2014 FIRST INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2014, : 173 - 176
  • [27] Are Software Updates Useless against Advanced Persistent Threats?
    Massacci, Fabio
    Di Tizio, Giorgio
    COMMUNICATIONS OF THE ACM, 2023, 66 (01) : 31 - 33
  • [28] A Cooperative Game-Theoretic Model in Cloud Storage Auditing
    Lin, Chung-Yi
    Tzeng, Wen-Guey
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2020, 36 (01) : 127 - 143
  • [29] Game-theoretic Strategy Analysis for Data Reliability Management in Cloud Storage Systems
    Lin, Chung-Yi
    Tzeng, Wen-Guey
    2014 EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY, 2014, : 187 - 195
  • [30] Surviving Advanced Persistent Threats - a Framework and Analysis
    Mehresh, Ruchika
    Upadhyaya, Shambhu
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2015), 2015, : 445 - 454