首页> 外文期刊>Complexity >GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks
【24h】

GLIDE: A Game Theory and Data-Driven Mimicking Linkage Intrusion Detection for Edge Computing Networks

机译:滑行:边缘计算网络的博弈论和数据驱动模拟联动入侵检测

获取原文
           

摘要

The real-time and high-continuity requirements of the edge computing network gain more and more attention because of its active defence problem, that is, a data-driven complex problem. Due to the dual constraints of the hybrid feature of edge computing networks and the uncertainty of new attack features, implementing active defence measures such as detection, evasion, trap, and control is essential for the security protection of edge computing networks with high real-time and continuity requirements. The basic idea of safe active defence is to make the defence gain more significant than the attack loss. To encounter the new attacks with uncertain features introduced by the ubiquitous transmission network in the edge computing network, this paper investigates the attack behaviour and presents an attack-defence mechanism based on game theory. Based on the idea of dynamic intrusion detection, we utilize the game theory in the field of edge computing network and suggest a data-driven mimicry intrusion detection game model-based technique called GLIDE. The game income of participants and utility computing methods under different deployment strategies are analysed in detail. According to the proof analysis of the Nash equilibrium condition in the model, the contradictory dynamic game relationship is described. Therefore, the optimal deployment strategy of the multiredundancy edge computing terminal intrusion detection service in the edge computing network is obtained by solving the game balance point. The detection probability of the edge computing network for network attacks is improved, and the cost of intrusion detection of the edge computing network is reduced.
机译:由于其主动防御问题,所以,边缘计算网络的实时和高连续性要求越来越多地关注,即数据驱动的复杂问题。由于边缘计算网络的混合特征的双限制以及新攻击特征的不确定性,实现了检测,逃避,陷阱和控制等主动防御措施对于具有高实时的边缘计算网络的安全保护至关重要和连续性要求。安全主动防御的基本思想是使防御增益比攻击损失更重要。为了在边缘计算网络中遇到无处不在的传输网络引入的不确定特征的新攻击,本文研究了攻击行为,并提出了一种基于博弈论的攻击防御机制。基于动态入侵检测的思想,我们利用了边缘计算网络领域的博弈论,并提出了一种称为滑行的数据驱动的模拟侵入检测游戏模型。详细分析了不同部署策略下参与者和公用事业计算方法的游戏收入。根据模型中纳什均衡条件的证明分析,描述了矛盾的动态游戏关系。因此,通过求解游戏平衡点获得边缘计算网络中的多风化边缘计算终端入侵检测服务的最佳部署策略。改进了用于网络攻击的边缘计算网络的检测概率,并且减少了边缘计算网络的入侵检测成本。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号