Research Article
Response to Multiple Attack Behaviour Models in Cloud Computing
@INPROCEEDINGS{10.1007/978-3-319-73317-3_56, author={Xu Liu and Xiaoqiang Di and Jinqing Li and Huamin Yang and Ligang Cong and Jianping Zhao}, title={Response to Multiple Attack Behaviour Models in Cloud Computing}, proceedings={Advanced Hybrid Information Processing. First International Conference, ADHIP 2017, Harbin, China, July 17--18, 2017, Proceedings}, proceedings_a={ADHIP}, year={2018}, month={2}, keywords={Behaviour model Attack-defense game Cloud computing}, doi={10.1007/978-3-319-73317-3_56} }
- Xu Liu
Xiaoqiang Di
Jinqing Li
Huamin Yang
Ligang Cong
Jianping Zhao
Year: 2018
Response to Multiple Attack Behaviour Models in Cloud Computing
ADHIP
Springer
DOI: 10.1007/978-3-319-73317-3_56
Abstract
User behaviour models have been widely used to simulate attack behaviour in the security domain. In this paper, we introduce one perfect rational and three bounded rational behaviour models to simulate attack behaviour of attack-defense game in cloud computing, and then discuss defender’s response to attacks. We assume cloud provider as the role of defender is intelligent to collect attack-related information so that it can predict attack behaviour model, thus the attack behaviour model is known to defender, we therefore build a single-objective optimization game model to find the optimal virtual machine (VM) monitoring strategy against attacker. Finally, through numerical analysis, we prove that when the attack behavior model is known, the corresponding single-objective optimization game solution is better than the other three solutions.