Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach

Fog computing has gained tremendous popularity due to its capability of addressing the surging demand on high-quality ubiquitous mobile services. Nevertheless, the highly virtualized environment in fog computing leads to vulnerability to cyber attacks such as advanced persistent threats. In this pap...

Full description

Saved in:
Bibliographic Details
Main Authors: Feng, Shaohan, Xiong, Zehui, Niyato, Dusit, Wang, Ping
Other Authors: School of Computer Science and Engineering
Format: Article
Language:English
Published: 2022
Subjects:
Online Access:https://hdl.handle.net/10356/159931
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-159931
record_format dspace
spelling sg-ntu-dr.10356-1599312022-07-06T01:53:48Z Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach Feng, Shaohan Xiong, Zehui Niyato, Dusit Wang, Ping School of Computer Science and Engineering Engineering::Computer science and engineering Cyber-Insurance Risk Management Fog computing has gained tremendous popularity due to its capability of addressing the surging demand on high-quality ubiquitous mobile services. Nevertheless, the highly virtualized environment in fog computing leads to vulnerability to cyber attacks such as advanced persistent threats. In this paper, we propose a novel game approach of cyber risk management for the fog computing platform. We adopt the cyber-insurance concept to transfer cyber risks from fog computing platform to a third party. The system model under consideration consists of three main entities, i.e., the fog computing provider, attacker, and cyber-insurer. The fog computing provider dynamically optimizes the allocation of its defense computing resources to improve the security of the fog computing platform which is composed of multiple fog nodes. Meanwhile, the attacker dynamically adjusts the allocation of its attack computing resources to increase the probability of successful attack. Additionally, to prevent from the potential loss due to the attacks, the provider also makes a dynamic decision on the subscription of cyber-insurance for each fog node. Thereafter, the cyber-insurer accordingly determines the premium of cyber-insurance for each fog node. To model this dynamic interactive decision making problem, we formulate a dynamic Stackelberg game. In the lower-level, we formulate an evolutionary subgame to analyze the provider's defense and cyber-insurance subscription strategies as well as the attacker's attack strategy. In the upper-level, the cyber-insurer optimizes its premium strategy, taking into account the evolutionary equilibrium at the lower-level evolutionary subgame. We analytically prove that the evolutionary equilibrium is unique and stable, and we investigate the Stackelberg equilibrium by capitalizing on tools from the optimal control theory. Moreover, we provide a series of insightful analytical and numerical results on the equilibrium of the dynamic Stackelberg game. Energy Market Authority (EMA) Ministry of Education (MOE) Nanyang Technological University This work was supported in part by WASP/NTU M4082187 (4080), Singapore MOE Tier 1 under Grant 2017-T1-002-007 RG122/17, MOE Tier 2 under Grant MOE2014-T2-2-015 ARC4/15, NRF2015-NRF-ISF001-2277, and EMA Energy Resilience under Grant NRF2017EWTEP003-041. 2022-07-06T01:53:48Z 2022-07-06T01:53:48Z 2019 Journal Article Feng, S., Xiong, Z., Niyato, D. & Wang, P. (2019). Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach. IEEE Transactions On Cloud Computing, 9(3), 995-1007. https://dx.doi.org/10.1109/TCC.2019.2896632 2168-7161 https://hdl.handle.net/10356/159931 10.1109/TCC.2019.2896632 2-s2.0-85061331154 3 9 995 1007 en M4082187 (4080) 2017-T1-002-007 RG122/17 MOE2014-T2-2-015 ARC4/15 NRF2015-NRF-ISF001-2277 NRF2017EWTEP003-041 IEEE Transactions on Cloud Computing © 2019 IEEE. All rights reserved.
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic Engineering::Computer science and engineering
Cyber-Insurance
Risk Management
spellingShingle Engineering::Computer science and engineering
Cyber-Insurance
Risk Management
Feng, Shaohan
Xiong, Zehui
Niyato, Dusit
Wang, Ping
Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach
description Fog computing has gained tremendous popularity due to its capability of addressing the surging demand on high-quality ubiquitous mobile services. Nevertheless, the highly virtualized environment in fog computing leads to vulnerability to cyber attacks such as advanced persistent threats. In this paper, we propose a novel game approach of cyber risk management for the fog computing platform. We adopt the cyber-insurance concept to transfer cyber risks from fog computing platform to a third party. The system model under consideration consists of three main entities, i.e., the fog computing provider, attacker, and cyber-insurer. The fog computing provider dynamically optimizes the allocation of its defense computing resources to improve the security of the fog computing platform which is composed of multiple fog nodes. Meanwhile, the attacker dynamically adjusts the allocation of its attack computing resources to increase the probability of successful attack. Additionally, to prevent from the potential loss due to the attacks, the provider also makes a dynamic decision on the subscription of cyber-insurance for each fog node. Thereafter, the cyber-insurer accordingly determines the premium of cyber-insurance for each fog node. To model this dynamic interactive decision making problem, we formulate a dynamic Stackelberg game. In the lower-level, we formulate an evolutionary subgame to analyze the provider's defense and cyber-insurance subscription strategies as well as the attacker's attack strategy. In the upper-level, the cyber-insurer optimizes its premium strategy, taking into account the evolutionary equilibrium at the lower-level evolutionary subgame. We analytically prove that the evolutionary equilibrium is unique and stable, and we investigate the Stackelberg equilibrium by capitalizing on tools from the optimal control theory. Moreover, we provide a series of insightful analytical and numerical results on the equilibrium of the dynamic Stackelberg game.
author2 School of Computer Science and Engineering
author_facet School of Computer Science and Engineering
Feng, Shaohan
Xiong, Zehui
Niyato, Dusit
Wang, Ping
format Article
author Feng, Shaohan
Xiong, Zehui
Niyato, Dusit
Wang, Ping
author_sort Feng, Shaohan
title Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach
title_short Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach
title_full Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach
title_fullStr Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach
title_full_unstemmed Dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach
title_sort dynamic resource management to defend against advanced persistent threats in fog computing: a game theoretic approach
publishDate 2022
url https://hdl.handle.net/10356/159931
_version_ 1738844950201630720