Cloud Provider's Response to Multiple Models of Attack Behaviors

Page: [325 - 333] Pages: 9

  • * (Excluding Mailing and Handling)

Abstract

Background: User behavior models have been widely used to simulate attack behaviors in the security domain. We revised all patents related to response to attack behavior models. How to decide the protected target against multiple models of attack behaviors is studied.

Methods: We utilize one perfect rational and three bounded rational behavior models to simulate attack behaviors in cloud computing, and then investigate cloud provider’s response based on Stackelberg game. The cloud provider plays the role of defender and it is assumed to be intelligent enough to predict the attack behavior model. Based on the prediction accuracy, two schemes are built in two situations.

Results: If the defender can predict the attack behavior model accurately, a single-objective game model is built to find the optimal protection strategy; otherwise, a multi-objective game model is built to find the optimal protection strategy.

Conclusion: The numerical results prove that the game theoretic model performs better in the corresponding situation.

Keywords: Cloud computing, behavior model, attack-defense game, VM, protection response, multi-objective optimization game.

Graphical Abstract

[1]
L.M. Kaufman, "Can public-cloud security meet its unique challenges?", IEEE Secur. Priv., vol. 8, pp. 55-57, 2010.
[2]
C.A. Kamhoua, L. Kwiat, K.A. Kwiat, J.S. Park, M. Zhao, and M. Rodriguez, "Game theoretic modeling of security and interdependency in a public cloud In ", IEEE International Conference on Cloud Computing Anchorage, AK, 2014, pp. 514-521.
[3]
L. Chen, and J. Leneutre, "A game theoretical framework on intrusion detection in heterogeneous networks. In ", IEEE Transactions on Information Forensics and Security,, vol. 4, pp. 165-178, 2009.
[4]
S. Saha, J. Sarkar, A. Dwivedi, N. Dwivedi, A.M. Narasimhamurthy, and R. Roy, "A novel revenue optimization model to address the operation and maintenance cost of a data center", J. Cloud Computing, vol. 5, pp. 1-23, 2016.
[5]
A. Tversky, and D. Kahneman, "Advances in prospect theory: Cumulative representation of uncertainty", J. Risk Uncertain., vol. 5, pp. 297-323, 1992.
[6]
R.D. McKelvey, and T.R. Palfrey, "Quantal response equilibria for normal form games", Games and Economic Behavior, , vol. 10, pp. 6-38, 1995.
[7]
T.H. Nguyen, R. Yang, A. Azaria, S. Kraus, and M. Tambe, ""Analyzing the effectiveness of adversary modeling in security games" In ", Proceedings of the 27th AAAI Conference on Artificial Intelligence Bellevue, Washington, 2013, pp. 718-724
[8]
Y.D. Abbasi, M. Short, A. Sinha, N. Sintov, C. Zhang, and M. Tambe, "Human adversaries in opportunistic crime security games: evaluating competing bounded rationality models In ", Proceedings of the Third Annual Conference on Advances in Cognitive Systems ACS Atlanta, Georgia, 2015, pp.2
[9]
D. Kar, F. Fang, F.D. Fave, N. Sintov, and M. Tambe, "A game of thrones: when human behavior models compete in repeated Stackelberg security games In ", Proceedings of International Conference on Autonomous Agents and Multiagent Systems Istanbul, Turkey, 2015, pp. 1381-1390.
[10]
R. Yang, F. Ordonez, and M. Tambe, "Computing optimal strategy against quantal response in security games In ", Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems Valencia, Spain, 2012, pp. 847-854.
[11]
R. Yang, C. Kiekintveld, F. Ordóñez, M. Tambe, and R. John, "Improving resource allocation strategies against human adversaries in security games: An extended study", Artif. Intell., vol. 195, pp. 440-469, 2013.
[12]
R. Yang, C. Kiekintveld, F. Ordonez, M. Tambe, and R. John, "Improving resource allocation strategy against human adversaries in security games In ", IJCAI Proceedings-International Joint Conference on Artificial Intelligence Barcelona, Catalonia, Spain, 2011, pp. 458
[13]
Y. Qian, W.B. Haskell, and M. Tambe, "Robust strategy against unknown risk-averse attackers in security games In ", Proceedings of International Conference on Autonomous Agents and Multiagent Systems Istanbul, Turkey, 2015, pp. 1341-1349.
[14]
E.A. Shieh, B. An, R. Yang, M. Tambe, C. Baldwin, J. DiRenzo, and G. Meyer, "PROTECT: An application of computational game theory for the security of the ports of the United States In ", Proceedings of the 26th AAAI Conference on Artificial Intelligence Toronto, Ontario, Canada, 2012, pp. 2173-2179.
[15]
J.H. Cho, Y. Wang, I.R. Chen, K.S. Chan, and A. Swami, "A survey on modeling and optimizing multi-objective systems", IEEE Commun. Surveys Tutorials , vol. 19, pp. 1867-1901, 2017.
[16]
Z. Fei, B. Li, S. Yang, C. Xing, H. Chen, and L. Hanzo, "A survey of multi-objective optimization in wireless sensor networks: metrics, algorithms, and open problems", IEEE Commun. Surveys Tutorials , vol. 19, pp. 550-586, 2017.
[17]
J. Cui, and R.S. John, "Empirical comparisons of descriptive multi-objective adversary models in stackelberg security games In ", 5th International Conference on Decision and Game Theory for Security Los Angeles, USA, 2014, pp. 309-318.
[18]
M. Brown, B. An, C. Kiekintveld, F. Ordóñez, and M. Tambe, "Multi-objective optimization for security games In ", Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems Valencia, Spain, 2012, pp. 863-870.
[19]
M. Jain, B. An, and M. Tambe, "Security games applied to real-world: research contributions and challenges", Moving Tar. Defense II, vol. 100, pp. 15-39, 2012.
[20]
I. Butun, M. Erol-Kantarci, and B. Kantarci, "Cloud-centric multi-level authentication as a service for secure public safety device networks", IEEE Communications Magazine, vol. 54, pp. 47-53, 2016.
[21]
L. Tawalbeh, H. Tawalbeh, and H. Song, “Intrusion and attacks over mobile networks and cloud health systems” IEEE INFOCOM., IEEE, 2017.
[22]
A. Čaušević, H. Fotouhi, and K. Lundqvist, Data security and privacy in cyber-physical systems for healthcare: foundations, principles and applications., Security and Privacy in Cyber-Physical Systems, 2017.
[23]
A. Aziz, System and method for detecting anomalous behaviors using a virtual machine environment. US Patent 9661018, 2017.
[24]
G. Kirti, R. Gupta, and K. Biswas, "“Techniques for cloud security monitoring and threat intelligence”", US Patent 15632174. 2017.,
[25]
R. Gibbons, A primer in game theory., Harvester Wheatsheaf, 1992.
[26]
B. Fischhoff, B. Goitein, and Z. Shapira, "subjective expected utility: a model of decision-making", J. Am. Soc. Inf. Sci., vol. 16, pp. 183-207, 1983.