2020
DOI: 10.3390/s20030804
|View full text |Cite
|
Sign up to set email alerts
|

A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things

Abstract: With limited computing resources and a lack of physical lines of defense, the Internet of Things (IoT) has become a focus of cyberattacks. In recent years, outbreak propagation attacks against the IoT have occurred frequently, and these attacks are often strategical. In order to detect the outbreak propagation as soon as possible, t embedded Intrusion Detection Systems (IDSs) are widely deployed in the IoT. This paper tackles the problem of outbreak detection in adversarial environment in the IoT. A dynamic sc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 45 publications
0
8
0
Order By: Relevance
“…Therefore, when defining the relevant income and objective function, we retain the form of previous work. 39 Given the mixed strategy of the defender and the pure strategy of the attacker, the expected defender's utility U D (x, A) is…”
Section: Utilitymentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, when defining the relevant income and objective function, we retain the form of previous work. 39 Given the mixed strategy of the defender and the pure strategy of the attacker, the expected defender's utility U D (x, A) is…”
Section: Utilitymentioning
confidence: 99%
“…27 CG algorithm can shorten the time to seek the optimal solution for enhancing the utility. In our previous work, 39 we also used the CG algorithm to solve similar problems. The following description and objective function construction will base on our previous work.…”
Section: Dynamic Threshold Strategy Based On Psomentioning
confidence: 99%
See 1 more Smart Citation
“…For example, Wahab et al developed a Bayesian Stackelberg game that helps the defender to determine optimal detection load distribution strategy among virtual machines within a cloud environment [19]. As another example, Chen et al develops an SSG model that detects adversarial outbreak in an IoT environment through determining strategic dynamic scheduling of intrusion detection systems [6].…”
Section: Stackelberg Security Gamesmentioning
confidence: 99%
“…NIP is also a useful model for researching the protection of IoT, e.g., the defensive resource allocation [15] and adversarial outbreak detection [19]. Numerous variations of NIP have been proposed and studied to meet different hypotheses under particular scenarios [16,17,[20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%