Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach
Fog computing has gained tremendous popularity due to its capability of addressing the surging demand on high-quality ubiquitous mobile services. Nevertheless, the highly virtualized environment in fog computing leads to vulnerability to cyber attacks such as advanced persistent threats. In this pap...
Saved in:
Main Authors: | , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2022
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/159931 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-159931 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1599312022-07-06T01:53:48Z Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach Feng, Shaohan Xiong, Zehui Niyato, Dusit Wang, Ping School of Computer Science and Engineering Engineering::Computer science and engineering Cyber-Insurance Risk Management Fog computing has gained tremendous popularity due to its capability of addressing the surging demand on high-quality ubiquitous mobile services. Nevertheless, the highly virtualized environment in fog computing leads to vulnerability to cyber attacks such as advanced persistent threats. In this paper, we propose a novel game approach of cyber risk management for the fog computing platform. We adopt the cyber-insurance concept to transfer cyber risks from fog computing platform to a third party. The system model under consideration consists of three main entities, i.e., the fog computing provider, attacker, and cyber-insurer. The fog computing provider dynamically optimizes the allocation of its defense computing resources to improve the security of the fog computing platform which is composed of multiple fog nodes. Meanwhile, the attacker dynamically adjusts the allocation of its attack computing resources to increase the probability of successful attack. Additionally, to prevent from the potential loss due to the attacks, the provider also makes a dynamic decision on the subscription of cyber-insurance for each fog node. Thereafter, the cyber-insurer accordingly determines the premium of cyber-insurance for each fog node. To model this dynamic interactive decision making problem, we formulate a dynamic Stackelberg game. In the lower-level, we formulate an evolutionary subgame to analyze the provider's defense and cyber-insurance subscription strategies as well as the attacker's attack strategy. In the upper-level, the cyber-insurer optimizes its premium strategy, taking into account the evolutionary equilibrium at the lower-level evolutionary subgame. We analytically prove that the evolutionary equilibrium is unique and stable, and we investigate the Stackelberg equilibrium by capitalizing on tools from the optimal control theory. Moreover, we provide a series of insightful analytical and numerical results on the equilibrium of the dynamic Stackelberg game. Energy Market Authority (EMA) Ministry of Education (MOE) Nanyang Technological University This work was supported in part by WASP/NTU M4082187 (4080), Singapore MOE Tier 1 under Grant 2017-T1-002-007 RG122/17, MOE Tier 2 under Grant MOE2014-T2-2-015 ARC4/15, NRF2015-NRF-ISF001-2277, and EMA Energy Resilience under Grant NRF2017EWTEP003-041. 2022-07-06T01:53:48Z 2022-07-06T01:53:48Z 2019 Journal Article Feng, S., Xiong, Z., Niyato, D. & Wang, P. (2019). Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach. IEEE Transactions On Cloud Computing, 9(3), 995-1007. https://dx.doi.org/10.1109/TCC.2019.2896632 2168-7161 https://hdl.handle.net/10356/159931 10.1109/TCC.2019.2896632 2-s2.0-85061331154 3 9 995 1007 en M4082187 (4080) 2017-T1-002-007 RG122/17 MOE2014-T2-2-015 ARC4/15 NRF2015-NRF-ISF001-2277 NRF2017EWTEP003-041 IEEE Transactions on Cloud Computing © 2019 IEEE. All rights reserved. |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Engineering::Computer science and engineering Cyber-Insurance Risk Management |
spellingShingle |
Engineering::Computer science and engineering Cyber-Insurance Risk Management Feng, Shaohan Xiong, Zehui Niyato, Dusit Wang, Ping Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach |
description |
Fog computing has gained tremendous popularity due to its capability of addressing the surging demand on high-quality ubiquitous mobile services. Nevertheless, the highly virtualized environment in fog computing leads to vulnerability to cyber attacks such as advanced persistent threats. In this paper, we propose a novel game approach of cyber risk management for the fog computing platform. We adopt the cyber-insurance concept to transfer cyber risks from fog computing platform to a third party. The system model under consideration consists of three main entities, i.e., the fog computing provider, attacker, and cyber-insurer. The fog computing provider dynamically optimizes the allocation of its defense computing resources to improve the security of the fog computing platform which is composed of multiple fog nodes. Meanwhile, the attacker dynamically adjusts the allocation of its attack computing resources to increase the probability of successful attack. Additionally, to prevent from the potential loss due to the attacks, the provider also makes a dynamic decision on the subscription of cyber-insurance for each fog node. Thereafter, the cyber-insurer accordingly determines the premium of cyber-insurance for each fog node. To model this dynamic interactive decision making problem, we formulate a dynamic Stackelberg game. In the lower-level, we formulate an evolutionary subgame to analyze the provider's defense and cyber-insurance subscription strategies as well as the attacker's attack strategy. In the upper-level, the cyber-insurer optimizes its premium strategy, taking into account the evolutionary equilibrium at the lower-level evolutionary subgame. We analytically prove that the evolutionary equilibrium is unique and stable, and we investigate the Stackelberg equilibrium by capitalizing on tools from the optimal control theory. Moreover, we provide a series of insightful analytical and numerical results on the equilibrium of the dynamic Stackelberg game. |
author2 |
School of Computer Science and Engineering |
author_facet |
School of Computer Science and Engineering Feng, Shaohan Xiong, Zehui Niyato, Dusit Wang, Ping |
format |
Article |
author |
Feng, Shaohan Xiong, Zehui Niyato, Dusit Wang, Ping |
author_sort |
Feng, Shaohan |
title |
Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach |
title_short |
Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach |
title_full |
Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach |
title_fullStr |
Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach |
title_full_unstemmed |
Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach |
title_sort |
dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach |
publishDate |
2022 |
url |
https://hdl.handle.net/10356/159931 |
_version_ |
1738844950201630720 |