An Intrusion Detection game in access control system for the M2M local cloud platform

Bayu Anggorojati, Neeli Rashmi Prasad, Ramjee Prasad

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

A distributed M2M local cloud platform which consists of distributed M2M gateways, needs to be equipped with an Intrusion Detection System (IDS) to monitor its resources against security attacks, especially from the insider, e.g. another gateway within the local cloud. In this paper, the interaction between rational attacker and defender in the context of an M2M local cloud platform as a multi-stage Bayesian game is studied. In this game formulation, a defender is able to update its belief upon the maliciousness of the attacker. The feasible Nash equilibrium of the game is reviewed and an analytical framework for the rational attacker and defender is provided for a given set of resources with different security values under some constraints on the attack and monitor resources. In the numerical analysis, it can be shown that by having multiple resources to be attacked and/or monitored simultaneously provides a kind of diversity which helps to improve the belief update of the defender.

Original languageEnglish
Title of host publication2013 19th Asia-Pacific Conference on Communications, APCC 2013
PublisherIEEE Computer Society
Pages345-350
Number of pages6
ISBN (Print)9781467360500
DOIs
Publication statusPublished - 2013
Event2013 19th Asia-Pacific Conference on Communications, APCC 2013 - Denpasar, Indonesia
Duration: 29 Aug 201331 Aug 2013

Publication series

Name2013 19th Asia-Pacific Conference on Communications, APCC 2013

Conference

Conference2013 19th Asia-Pacific Conference on Communications, APCC 2013
Country/TerritoryIndonesia
CityDenpasar
Period29/08/1331/08/13

Keywords

  • Game theory
  • M2M
  • access control
  • cloud
  • intrusion detection

Fingerprint

Dive into the research topics of 'An Intrusion Detection game in access control system for the M2M local cloud platform'. Together they form a unique fingerprint.

Cite this