通信学报 ›› 2023, Vol. 44 ›› Issue (2): 70-81.doi: 10.11959/j.issn.1000-436x.2023040

• 学术论文 • 上一篇    下一篇

移动边缘计算网络下基于静态贝叶斯博弈的入侵响应策略研究

范伟1,2, 彭诚1,2, 朱大立1,2, 王雨晴1,2   

  1. 1 中国科学院信息工程研究所,北京 100093
    2 中国科学院大学网络空间安全学院,北京 100049
  • 修回日期:2023-01-10 出版日期:2023-02-25 发布日期:2023-02-01
  • 作者简介:范伟(1984− ),男,北京人,博士,中国科学院信息工程研究所高级工程师、硕士生导师,主要研究方向为移动通信安全、云计算安全、虚拟化安全等
    彭诚(1994− ),男,北京人,中国科学院信息工程研究所博士生,主要研究方向为移动通信安全、通信协议分析等
    朱大立(1972− ),男,北京人,博士,中国科学院信息工程研究所正高级工程师、博士生导师,主要研究方向为移动互联网安全等
    王雨晴(1995− ),女,天津人,中国科学院信息工程研究所硕士生,主要研究方向为边缘计算安全等
  • 基金资助:
    国家重点研发计划基金资助项目(2019YFB1005204)

Research on intrusion response strategy based on static Bayesian game in mobile edge computing network

Wei FAN1,2, Cheng PENG1,2, Dali ZHU1,2, Yuqing WANG1,2   

  1. 1 Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
    2 School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
  • Revised:2023-01-10 Online:2023-02-25 Published:2023-02-01
  • Supported by:
    The National Key Research and Development Program of China(2019YFB1005204)

摘要:

针对移动边缘计算环境下边缘节点资源受限、入侵过程难以被准确检测且缺乏有效应对外部入侵的入侵响应策略的问题,提出了一种适用于移动边缘计算环境的入侵检测网络结构,建立了基于静态贝叶斯博弈的入侵响应决策模型,模拟边缘节点与外部入侵者的网络交互行为,并对博弈过程中攻击者和防御者选择不同行为的概率进行了预测。入侵响应决策模型综合考虑系统资源、响应成本以及检测率、误报率和漏报率等因素,在兼顾入侵检测系统资源消耗及边缘节点隐私保护的基础上,对入侵检测系统的响应决策进行优化。实验分析了影响入侵响应决策的因素,为具体应用提供了实验依据。

关键词: 移动边缘计算, 静态贝叶斯博弈, 贝叶斯纳什均衡

Abstract:

In the mobile edge computing (MEC) environment, the resources of edge nodes are limited.It is difficult to detect the intrusion process accurately, and there is no effective intrusion response strategy to deal with external intrusions.An intrusion detection network structure suitable for mobile edge computing environment was proposed and an intrusion response decision model based on static Bayesian game was established to simulate the network interaction behavior between edge nodes and external intruders.The probability of attackers and defenders in the game process was predicted respectively.The influence of the system resource, the cost of intrusion response, the detection rate and false alarm rate were considered comprehensively by the intrusion response decision model.The response decision of the intrusion detection system was optimized on the basis of the considering both resource consumption of the intrusion detection and the privacy protection of the edge nodes.The factors that affected the decision-making of intrusion response were analyzed, and the experimental basis for the specific application was provided.

Key words: mobile edge computing, static Bayesian game, Bayesian-Nash equilibrium

中图分类号: 

No Suggested Reading articles found!