Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach

AI-generated keywords: Advanced Persistent Threats Cloud Storage Systems Colonel Blotto Game CPU Allocation Reinforcement Learning

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Authors delve into Advanced Persistent Threat (APT) attacks on cloud storage systems
  • Study formulates interactions as a Colonel Blotto game between APT attacker and defender
  • Focus on deriving Nash equilibria for CPU allocation games with symmetric and asymmetric CPUs
  • Assess impact of limited CPU resources, data storage size, and number of storage devices on data protection level and utility
  • Proposed CPU allocation scheme based on "hotbooting" policy hill-climbing (PHC) to enhance defense performance
  • Introduction of hotbooting deep Q-network (DQN)-based CPU allocation scheme to improve APT detection performance
  • Simulation results show reinforcement learning-based strategy outperforms Q-learning-based approaches in enhancing data protection levels and overall utility
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Minghui Min, Liang Xiao, Caixia Xie, Mohammad Hajimirsadeghi, Narayan B. Mandayam

Abstract: Advanced Persistent Threat (APT) attackers apply multiple sophisticated methods to continuously and stealthily steal information from the targeted cloud storage systems and can even induce the storage system to apply a specific defense strategy and attack it accordingly. In this paper, the interactions between an APT attacker and a defender allocating their Central Processing Units (CPUs) over multiple storage devices in a cloud storage system are formulated as a Colonel Blotto game. The Nash equilibria (NEs) of the CPU allocation game are derived for both symmetric and asymmetric CPUs between the APT attacker and the defender to evaluate how the limited CPU resources, the date storage size and the number of storage devices impact the expected data protection level and the utility of the cloud storage system. A CPU allocation scheme based on "hotbooting" policy hill-climbing (PHC) that exploits the experiences in similar scenarios to initialize the quality values to accelerate the learning speed is proposed for the defender to achieve the optimal APT defense performance in the dynamic game without being aware of the APT attack model and the data storage model. A hotbooting deep Q-network (DQN)-based CPU allocation scheme further improves the APT detection performance for the case with a large number of CPUs and storage devices. Simulation results show that our proposed reinforcement learning based CPU allocation can improve both the data protection level and the utility of the cloud storage system compared with the Q-learning based CPU allocation against APTs.

Submitted to arXiv on 19 Jan. 2018

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 1801.06270v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In their paper titled "Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach," authors Minghui Min, Liang Xiao, Caixia Xie, Mohammad Hajimirsadeghi, and Narayan B. Mandayam delve into the realm of Advanced Persistent Threat (APT) attacks on cloud storage systems. These attackers employ sophisticated methods to stealthily extract information from targeted cloud storage systems while manipulating defense strategies to their advantage. The study formulates the interactions between an APT attacker and a defender allocating their Central Processing Units (CPUs) across multiple storage devices as a Colonel Blotto game. The research focuses on deriving Nash equilibria (NEs) for CPU allocation games with symmetric and asymmetric CPUs between the APT attacker and the defender. The goal is to assess how limited CPU resources, data storage size, and the number of storage devices impact the expected data protection level and utility of the cloud storage system. To enhance defense performance against APT attacks without prior knowledge of attack or data storage models, a CPU allocation scheme based on "hotbooting" policy hill-climbing (PHC) is proposed. This approach leverages past experiences in similar scenarios to accelerate learning speed and achieve optimal defense outcomes. Furthermore, a hotbooting deep Q-network (DQN)-based CPU allocation scheme is introduced to enhance APT detection performance in scenarios involving numerous CPUs and storage devices. Simulation results demonstrate that the reinforcement learning-based CPU allocation strategy outperforms Q-learning-based approaches in improving both data protection levels and overall utility of cloud storage systems when combating APT threats. Through innovative methodologies like hotbooting PHC and DQN-based schemes, this research offers valuable insights into bolstering defenses against dynamic APT attacks in cloud environments.
Created on 31 May. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.