is based on stochastic game theory and merges the
concept of active defense. The model enhances the attack-
defense graph, redefines the reward function and payoff
matrix, and provides the optimal defense strategy
algorithm. This algorithm calculates the attack and defense
payoff matrix by taking into account the long-term interests
and then determines the best defense strategy based on this.
To verify the effectiveness of the model, we simulate the
reliability of four scenarios using stochastic Petri nets and
Markov chains. The results demonstrate that the model
outperforms both the deployment of all defense actions and
the absence of defense actions. Compared with mainstream
models, the proposed model outperforms in terms of
optimal strategy form, defense success rate and gain, and
system stability probability. The model's backtracking
algorithm complexity is too high, making it more taxing for
larger cloud platform systems. In the future, we will
continue to optimize the algorithm's time complexity.
REFERENCES
Abdalzaher, M. S., Seddik, K., Muta, O., & Abdelrahman,
A. (2016). Using Stackelberg game to enhance node
protection in WSNs. 853–856. https://doi.org/10.1109/
CCNC.2016.7444900
Almorsy, M., Grundy, J., & Müller, I. (2016). An Analysis
of the Cloud Computing Security Problem.
https://arxiv.org/abs/1609.01107
Balaji, S., Julie, E. G., Robinson, Y. H., Kumar, R., Thong,
P. H., & Son, L. H. (2019). Design of a security-aware
routing scheme in Mobile Ad-hoc Network using
repeated game model. Computer Standards and
Interfaces, 66, 103358-. https://doi.org/10.1016/j.csi.
2019.103358
Chen, X., Liu, X., Zhang, L., & Tang, C. (2019). Optimal
Defense Strategy Selection for Spear-Phishing Attack
Based on a Multistage Signaling Game. IEEE Access,
7, 19907–19921. https://doi.org/10.1109/ACCESS.2019.
2897724
Dugan, J. B., Trivedi, K. S., Smotherman, M. K., & Geist,
R. M. (1986). The hybrid automated reliability
predictor. Journal of Guidance, Control, and Dynamics,
9(3), 319–331. https://doi.org/10.2514/3.20109
Elmir, I., El mehdi, K., Mohamed, H., Abdelkrim, H., &
Kim, D. seong. (2022). A Game Theoretic approach
based virtual machine migration for cloud environment
security. International Journal of Communication
Networks and Information Security (IJCNIS), 9(3).
https://doi.org/10.17762/ijcnis.v9i3.2579
Fanti, M. P., Nolich, M., Simic, S., & Ukovich, W. (2016).
Modeling cyber attacks by stochastic games and Timed
Petri Nets. 002960–002965. https://doi.org/10.1109/
SMC.2016.7844690
Goyal, A., Carter, W. C., Silva, E., Lavenberg, S. S., &
Trivedi, K. H. (1986). The System Availability
Estimator. 6th Annual International Symposium on
Fault-Tolerant Computing Systems. http://www.
researchgate.net/publication/236231098_The_System_
Availability_Estimator
Huang, J., Zhang, H., & Wang, J. (2017). Markov
Evolutionary Games for Network Defense Strategy
Selection. IEEE Access, 5, 19505–19516.
https://doi.org/10.1109/ACCESS.2017.2753278
Islam, M. N. U., Fahmin, A., Hossain, M. S., &
Atiquzzaman, M. (2021). Denial-of-Service Attacks on
Wireless Sensor Network and Defense Techniques.
Wireless Personal Communications, 116(3), 1993–
2021. https://doi.org/10.1007/s11277-020-07776-3
Jakóbik, A. (2020). Stackelberg game modeling of cloud
security defending strategy in the case of information
leaks and corruption. Simulation Modelling Practice
and Theory, 103, 102071-. https://doi.org/10.1016/j.
simpat.2020.102071
Jiang, W., Ma, Z., & Deng, X. (2019). An attack-defense
game based reliability analysis approach for wireless
sensor networks. International Journal of Distributed
Sensor Networks, 15(4), 1550147719841293.
Kandoussi, E. M., Hanini, M., El Mir, I., & Haqiq, A.
(2020). Toward an integrated dynamic defense system
for strategic detecting attacks in cloud networks using
stochastic game. Telecommunication Systems, 73(3),
397–417. https://doi.org/10.1007/s11235-019-00616-1
Lalropuia, K. C., & Gupta, V. (2020). A Bayesian game
model and network availability model for small cells
under denial of service (DoS) attack in 5G wireless
communication network. Wireless Networks, 26(1),
557–572. https://doi.org/10.1007/s11276-019-02163-8
Liang, X., & Xiao, Y. (2013). Game Theory for Network
Security. IEEE Communications Surveys and Tutorials,
15(1), 472–486. https://doi.org/10.1109/SURV.2012.0
62612.00056
Liu, X., Zhang, H., Zhang, Y., Shao, L., & Han, J. (2019).
Active Defense Strategy Selection Method Based on
Two-Way Signaling Game. Security and
Communication Networks, 2019, 1–14. https://doi.org/
10.1155/2019/1362964
Liu, X., Zhang, J., Zhu, P., Tan, Q., & Yin, W. (2021).
Quantitative cyber-physical security analysis
methodology for industrial control systems based on
incomplete information Bayesian game. Computers &
Security, 102, 102138-. https://doi.org/10.1016/j.cose.
2020.102138
Sabahi, F. (2011). Cloud computing security threats and
responses. 245–249. https://doi.org/10.1109/ICCSN.20
11.6014715
Sahner, R. A., & Trivedi, K. S. (1987). Reliability
Modeling Using SHARPE. IEEE Transactions on
Reliability, R-36(2), 186–193. https://doi.org/10.1109/
TR.1987.5222336
Sotomayor, M., Pérez-Castrillo, D., & Castiglione, F.
(2020). Complex social and behavioral systems: Game
theory and agent-based models. Springer Nature.
van Ravenzwaaij, D., Cassey, P., & Brown, S. D. (2018). A
simple introduction to Markov Chain Monte-Carlo
sampling. Psychonomic Bulletin & Review, 25(1),
143–154. https://doi.org/10.3758/s13423-016-1015-8