2020
DOI: 10.1016/j.cose.2020.101732
|View full text |Cite
|
Sign up to set email alerts
|

GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(12 citation statements)
references
References 18 publications
0
12
0
Order By: Relevance
“…IoT platform has been a popular target for cybercriminals as it faces significant risks. According to a survey from Palo Alto Networks' Unit 42, 98 percent of intelligent system data is not encrypted, and 42 percent are having IoT sensor flaws (Gill, Saxena & Sharma, 2020;Einy, Oz & Navaei, 2021;Heal & Kunreuther, 2005). Adversaries may use the compromised computers to enter an IoT botnet and carry out effective and massive attacks.…”
Section: Research Areamentioning
confidence: 99%
“…IoT platform has been a popular target for cybercriminals as it faces significant risks. According to a survey from Palo Alto Networks' Unit 42, 98 percent of intelligent system data is not encrypted, and 42 percent are having IoT sensor flaws (Gill, Saxena & Sharma, 2020;Einy, Oz & Navaei, 2021;Heal & Kunreuther, 2005). Adversaries may use the compromised computers to enter an IoT botnet and carry out effective and massive attacks.…”
Section: Research Areamentioning
confidence: 99%
“…SMDP [22] proposes applying the Markov decision process method to attack trapping, transforms the continuous-time process into an equivalent discrete decision model, uses reinforcement learning to train the model, and finally gets the optimal strategy. Gill et al [23] and others designed an independent GTM-CSec model, which combines the static game of complete information with the design of trapping mechanism, and simplifies the game model through inferior strategies; this model can intelligently select appropriate defense modules but reduce system energy consumption and respond to attacks intelligently. Zhou et al [24] used the Markov to model the penetration testing process and proposed an improved DQN algorithm, which converges faster in larger networks and is more suitable for large-scale networks.…”
Section: Related Workmentioning
confidence: 99%
“…Where represented as label function for the assigned variable at each point in the cluster to a label . From that, optimized values of nodes are represented in equ (10).…”
Section: Cluster Head Election Based On Improved Flower Pollination Algorithm (Ifpa)mentioning
confidence: 99%
“…The IDS agents are deployed in WSN in three possible ways such as centralized, distributed, and hybrid. Those agents are effective within the deployed base station, the centralized approach does not impact small node performance [10]. Situation awareness (SA) is considered a basic element due to space and time for acting as the network.…”
Section: Introductionmentioning
confidence: 99%