A differential game model of intrusion detection system in cloud computing

The multi-mesh distributed and open structure of cloud computing is more weak and vulnerable to security threats. Intrusion detection system should be incorporated in cloud infrastructure to monitor cloud resources against security attacks. In this article, the interaction between rational cloud res...

Full description

Bibliographic Details
Main Authors: Zhi Li, Haitao Xu, Yanzhu Liu
Format: Article
Language:English
Published: Hindawi - SAGE Publishing 2017-01-01
Series:International Journal of Distributed Sensor Networks
Online Access:https://doi.org/10.1177/1550147716687995
_version_ 1797710854305611776
author Zhi Li
Haitao Xu
Yanzhu Liu
author_facet Zhi Li
Haitao Xu
Yanzhu Liu
author_sort Zhi Li
collection DOAJ
description The multi-mesh distributed and open structure of cloud computing is more weak and vulnerable to security threats. Intrusion detection system should be incorporated in cloud infrastructure to monitor cloud resources against security attacks. In this article, the interaction between rational cloud resource defender and the potential malicious user in the cloud as a differential game is investigated. The feedback Nash equilibrium of the game is reviewed and a complex decision-making process and interactions between the cloud resource defender and a malicious user of cloud are also analyzed. The system results support a theoretical foundation in detecting the malicious attack, which can help cloud intrusion detection system make the optimal dynamic strategies to improve the defensive ability.
first_indexed 2024-03-12T06:57:22Z
format Article
id doaj.art-ae8bccf15f6c427ba2f2ab5d95064507
institution Directory Open Access Journal
issn 1550-1477
language English
last_indexed 2024-03-12T06:57:22Z
publishDate 2017-01-01
publisher Hindawi - SAGE Publishing
record_format Article
series International Journal of Distributed Sensor Networks
spelling doaj.art-ae8bccf15f6c427ba2f2ab5d950645072023-09-02T23:57:43ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772017-01-011310.1177/1550147716687995A differential game model of intrusion detection system in cloud computingZhi Li0Haitao Xu1Yanzhu Liu2School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing, ChinaGreat Wall Computer Software and Systems Inc., Beijing, ChinaThe multi-mesh distributed and open structure of cloud computing is more weak and vulnerable to security threats. Intrusion detection system should be incorporated in cloud infrastructure to monitor cloud resources against security attacks. In this article, the interaction between rational cloud resource defender and the potential malicious user in the cloud as a differential game is investigated. The feedback Nash equilibrium of the game is reviewed and a complex decision-making process and interactions between the cloud resource defender and a malicious user of cloud are also analyzed. The system results support a theoretical foundation in detecting the malicious attack, which can help cloud intrusion detection system make the optimal dynamic strategies to improve the defensive ability.https://doi.org/10.1177/1550147716687995
spellingShingle Zhi Li
Haitao Xu
Yanzhu Liu
A differential game model of intrusion detection system in cloud computing
International Journal of Distributed Sensor Networks
title A differential game model of intrusion detection system in cloud computing
title_full A differential game model of intrusion detection system in cloud computing
title_fullStr A differential game model of intrusion detection system in cloud computing
title_full_unstemmed A differential game model of intrusion detection system in cloud computing
title_short A differential game model of intrusion detection system in cloud computing
title_sort differential game model of intrusion detection system in cloud computing
url https://doi.org/10.1177/1550147716687995
work_keys_str_mv AT zhili adifferentialgamemodelofintrusiondetectionsystemincloudcomputing
AT haitaoxu adifferentialgamemodelofintrusiondetectionsystemincloudcomputing
AT yanzhuliu adifferentialgamemodelofintrusiondetectionsystemincloudcomputing
AT zhili differentialgamemodelofintrusiondetectionsystemincloudcomputing
AT haitaoxu differentialgamemodelofintrusiondetectionsystemincloudcomputing
AT yanzhuliu differentialgamemodelofintrusiondetectionsystemincloudcomputing