Abstract

User behaviour models have been widely used to simulate attack behaviour in the security domain. In this paper, we introduce one perfect rational and three bounded rational behaviour models to simulate attack behaviour of attack-defense game in cloud computing, and then discuss defender’s response to attacks. We assume cloud provider as the role of defender is intelligent to collect attack-related information so that it can predict attack behaviour model, thus the attack behaviour model is known to defender, we therefore build a single-objective optimization game model to find the optimal virtual machine (VM) monitoring strategy against attacker. Finally, through numerical analysis, we prove that when the attack behavior model is known, the corresponding single-objective optimization game solution is better than the other three solutions.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.