A differential game model of intrusion detection system in cloud computing
The multi-mesh distributed and open structure of cloud computing is more weak and vulnerable to security threats. Intrusion detection system should be incorporated in cloud infrastructure to monitor cloud resources against security attacks. In this article, the interaction between rational cloud res...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi - SAGE Publishing
2017-01-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147716687995 |
_version_ | 1797710854305611776 |
---|---|
author | Zhi Li Haitao Xu Yanzhu Liu |
author_facet | Zhi Li Haitao Xu Yanzhu Liu |
author_sort | Zhi Li |
collection | DOAJ |
description | The multi-mesh distributed and open structure of cloud computing is more weak and vulnerable to security threats. Intrusion detection system should be incorporated in cloud infrastructure to monitor cloud resources against security attacks. In this article, the interaction between rational cloud resource defender and the potential malicious user in the cloud as a differential game is investigated. The feedback Nash equilibrium of the game is reviewed and a complex decision-making process and interactions between the cloud resource defender and a malicious user of cloud are also analyzed. The system results support a theoretical foundation in detecting the malicious attack, which can help cloud intrusion detection system make the optimal dynamic strategies to improve the defensive ability. |
first_indexed | 2024-03-12T06:57:22Z |
format | Article |
id | doaj.art-ae8bccf15f6c427ba2f2ab5d95064507 |
institution | Directory Open Access Journal |
issn | 1550-1477 |
language | English |
last_indexed | 2024-03-12T06:57:22Z |
publishDate | 2017-01-01 |
publisher | Hindawi - SAGE Publishing |
record_format | Article |
series | International Journal of Distributed Sensor Networks |
spelling | doaj.art-ae8bccf15f6c427ba2f2ab5d950645072023-09-02T23:57:43ZengHindawi - SAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772017-01-011310.1177/1550147716687995A differential game model of intrusion detection system in cloud computingZhi Li0Haitao Xu1Yanzhu Liu2School of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing, ChinaSchool of Computer and Communication Engineering, University of Science and Technology Beijing (USTB), Beijing, ChinaGreat Wall Computer Software and Systems Inc., Beijing, ChinaThe multi-mesh distributed and open structure of cloud computing is more weak and vulnerable to security threats. Intrusion detection system should be incorporated in cloud infrastructure to monitor cloud resources against security attacks. In this article, the interaction between rational cloud resource defender and the potential malicious user in the cloud as a differential game is investigated. The feedback Nash equilibrium of the game is reviewed and a complex decision-making process and interactions between the cloud resource defender and a malicious user of cloud are also analyzed. The system results support a theoretical foundation in detecting the malicious attack, which can help cloud intrusion detection system make the optimal dynamic strategies to improve the defensive ability.https://doi.org/10.1177/1550147716687995 |
spellingShingle | Zhi Li Haitao Xu Yanzhu Liu A differential game model of intrusion detection system in cloud computing International Journal of Distributed Sensor Networks |
title | A differential game model of intrusion detection system in cloud computing |
title_full | A differential game model of intrusion detection system in cloud computing |
title_fullStr | A differential game model of intrusion detection system in cloud computing |
title_full_unstemmed | A differential game model of intrusion detection system in cloud computing |
title_short | A differential game model of intrusion detection system in cloud computing |
title_sort | differential game model of intrusion detection system in cloud computing |
url | https://doi.org/10.1177/1550147716687995 |
work_keys_str_mv | AT zhili adifferentialgamemodelofintrusiondetectionsystemincloudcomputing AT haitaoxu adifferentialgamemodelofintrusiondetectionsystemincloudcomputing AT yanzhuliu adifferentialgamemodelofintrusiondetectionsystemincloudcomputing AT zhili differentialgamemodelofintrusiondetectionsystemincloudcomputing AT haitaoxu differentialgamemodelofintrusiondetectionsystemincloudcomputing AT yanzhuliu differentialgamemodelofintrusiondetectionsystemincloudcomputing |