Next Article in Journal
Incentivizing for Truth Discovery in Edge-assisted Large-scale Mobile Crowdsensing
Next Article in Special Issue
SNPL: One Scheme of Securing Nodes in IoT Perception Layer
Previous Article in Journal
A Novel Fuzzy-Adaptive Extended Kalman Filter for Real-Time Attitude Estimation of Mobile Robots
Previous Article in Special Issue
Access Control Based on Ciphertext Attribute Authentication and Threshold Policy for the Internet of Things
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things

1
State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China
2
Institute of Information Engineering Chinese Academy of Sciences, Beijing 100093, China
3
School of Cyberspace, Hangzhou Dianzi University, Hangzhou 310018, China
4
School of Cybersecurity, University of Chinese Academy of Sciences, Beijing 100049, China
*
Author to whom correspondence should be addressed.
Sensors 2020, 20(3), 804; https://doi.org/10.3390/s20030804
Submission received: 27 December 2019 / Revised: 30 January 2020 / Accepted: 30 January 2020 / Published: 1 February 2020
(This article belongs to the Special Issue Threat Identification and Defence for Internet-of-Things)

Abstract

:
With limited computing resources and a lack of physical lines of defense, the Internet of Things (IoT) has become a focus of cyberattacks. In recent years, outbreak propagation attacks against the IoT have occurred frequently, and these attacks are often strategical. In order to detect the outbreak propagation as soon as possible, t embedded Intrusion Detection Systems (IDSs) are widely deployed in the IoT. This paper tackles the problem of outbreak detection in adversarial environment in the IoT. A dynamic scheduling strategy based on specific IDSs monitoring of IoT devices is proposed to avoid strategic attacks. Firstly, we formulate the interaction between the defender and attacker as a Stackelberg game in which the defender first chooses a set of device nodes to activate, and then the attacker selects one seed (one device node) to spread the worms. This yields an extremely complex bilevel optimization problem. Our approach is to build a modified Column Generation framework for computing the optimal strategy effectively. The optimal response of the defender’s problem is expressed as mixed-integer linear programming (MILPs). It is proved that the solution of the defender’s optimal response is a NP-hard problem. Moreover, the optimal response of defenders is improved by an approximate algorithm--a greedy algorithm. Finally, the proposed scheme is tested on some randomly generated instances. The experimental results show that the scheme is effective for monitoring optimal scheduling.

1. Introduction

1.1. Background

With the rapid development of communications technology and perceptual recognition technology, the Internet of Things [1] has been widely applied in intelligent medical treatment, intelligent transportation and other areas, which has brought tremendous convenience to peoples’ lives [2], but lots of security challenges at the same time. In recent years, the IoT has been subjected to a large number of attacks with typical outbreak propagation features [3]. Through outbreak propagation, a worm can infect a wide range of devices (e.g., intelligent devices, smart webcams) in a short period [4], resulting in severe economic losses, and even large-scale network paralysis. For example, in October 2016, the Mirai worm [5] infected some 500,000 IoT devices on the east coast of the United States within 6 hours, causing DYN to lose $110 million; in May 2017, the WannaCry worm attacked more than 300,000 users in 150 countries in 24 hours, causing a loss of 8 billion US dollars [6], especially for users with IoT devices, such as the medical systems [7]. To detect the worm outbreak propagation as soon as possible, we can collect potential threat data by deploying specific embedded Intrusion Detection Systems (IDSs) in the IoT [8,9]. Therefore, the rapid detection of the worm outbreak propagation in the IoT with limited resources by IDS has become an urgent problem to be solved. Herein, such IoT devices with embedded IDS are collectively referred to as “sensors”. The "scheduling strategy" mentioned in the following chapters of this paper is mainly aimed at methods of “sensor” combination opening.

1.2. Motivation

Generally, the initiator of outbreak propagation is a malicious party, and our goal is to detect the outbreak propagation as soon as possible. For example, in a water network, the problem is where should we place a limited number of sensors to quickly detect contaminants [10,11,12,13,14], while in smart power grids, what is concerned about is finding the failure node in a short time [15]. It is natural in these scenarios to consider the problem of adversarial outbreak detection (AOD), where the defender can first select a set of nodes to deploy sensors, and subsequently the attacker can choose the source of infection to spread malicious information. Although there have been many studies on the AOD problem [11,15], the scenario setting of these works (e.g., a water network setting) is different from our scenario and assumptions (e.g., cybersecurity settings and parameters). A common assumption in the existing AOD problem is that the attacker first chooses an initially infected node according to a probability distribution [10,12]. However, in our scenario, the attacker strategically initiates an outbreak propagation by considering the monitoring strategy in the IoT. Therefore, the following problems need to be considered for our scenario:

1.2.1. The Uncertainty of Propagation Trajectory

The propagation trajectory is uncertain. For instance, the attacker exploits a vulnerability to infect node v 0 , which has two adjacent nodes v 1 and v 2 . There are some vulnerabilities on nodes v 1 and v 2 that can be exploitable by attackers, respectively. It is uncertain which vulnerability on nodes v 1 and v 2 will be exploited by the attacker to spread malicious code, as shown in Figure 1. The uncertainty of the outbreak propagation trajectory leads to two problems: (1) the outbreak propagation process is dynamic; (2) the outbreak detection time is uncertain. It should be considered how to simulate the dynamic of the outbreak propagation process, and how to determine the time when outbreak propagation is detected. Moreover, the determination of detection time will be complicated by the propagation dynamics and uncertainty.

1.2.2. The Limit of Computing Resource

Most of the devices in the IoT are micro-embedded, with limited hardware and software resources as well as minor computing tasks, and more resources need to be saved for normal services. For example, in smart grid defense, it may not be realistic to apply the latest patch to all systems since it may potentially require system downtime affecting customer service [15]. Continuous running of the IDS program can cause the excessive power consumption which will lead to the crash of the IoT network. Thus, the balance between limited resources and scheduling monitoring needs to be considered.

1.2.3. The Dynamics of Scheduling Strategy

The IoT system is composed of a mass of devices that are frequently exposed to public situations, lacking effective protection, and are more vulnerable to attack [16]. For example, while the administrator adopts a regular scheduling strategy to monitor network security status, the attacker can obtain the relevant information (e.g., position) of the sensors through some attack analysis tools (such as eavesdropping [17], extended sleep [18], polymorphic worm [19], probe-response attack [20]). The attacker strategically selects a network device node as a source of infection outbreak propagation through acquired sensors information to avoid being monitored [20]. There have been some existing works taking into account the adversarial environment [10,11,15], but the impact of the attacker on monitoring scheduling strategy has been neglected. Due to the certain regularity of the existing schemes and it cannot deal with the above attacker’s strategical attack.
In view of the above three aspects, there are many studies. The principles of epidemic modelling were applied to IoT networks composed of wireless sensor nodes to describe the uncertain propagation trajectory, where the most commonly are model SI, SIR and SIS [21,22,23]. The game theory was introduced into IoT network to obtain allocated resources for the defenders and the attackers [11,16,24,25,26]. The adversary was set as the attacker chooses to pollute when knowing the position of the sensor, and some deployment schemes of sensors in the adversarial environment was proposed [11,27,28]. While, under such circumstance, it is considered that the robustness of collecting threat data and detecting outbreak propagation can be affected by the strategic attack. Thus, existing approaches cannot be directly applied in current situation. It is necessary to design an effective scheduling strategy to carry out irregular dynamic monitoring of adversarial outbreak propagation in IoT, making the results of detection more robust.

1.3. Our Contribution

To address the above challenges, we used the Monte-Carlo [29] method to simulate the outbreak propagation process of trajectory uncertainty. We built the AOD problem as a Stackelberg model, in which the controller of the IDSs acts as the defender, first selects the scheduling strategy (i.e., the initial strategy), the initiator of the outbreak propagation as the attacker, and then the source node of the outbreak propagation based on the selected open sensors selected by the observed defender. It is more realistic considering the impact of attackers on monitoring scheduling strategy, aiming at the attack and defense process between administrators and attackers. The leader (defender) will select several nodes of the network for monitoring, whereas the follower (attacker) will select one node in the network as the source of infection. The contribution of this paper is as follows:
  • Firstly, we generated a “Propagation Time Initialization Table” to obtain the determined detection time.
  • Secondly, we built a Stackelberg model which is proposed to formulate the Adversarial Outbreak Detection problem in limited resource for IoT.
  • For the Stackelberg model, we adopt a CG-AOD algorithm. As the response of defender is an NP-hard problem, we formulated mixed-integer linear programming (MILPs) and exploited an approximate algorithm--greedy algorithm to speed up the solution. Theoretically, we proved that an approximate ratio of constant factors can be obtained through the algorithm.
  • Finally, we design a numerical experiment and a series of experiments in terms of solution time and quality by constructing a specific network case model and expansion model. The results show that the CG-AOD and CG-AOD/Appro algorithm is robust and scalable.
The rest of this paper is organized as follows: In Section 2, we discuss related work. In Section 3, we introduce our theoretical model. Section 4 formulates CG-AOD algorithm as two parts and analyzes the corresponding factors. Experiments and the analysis are given in Section 5. A conclusion is drawn in Section 6.

2. Related Work

We divide the related work into four parts: (i) IDS for IoT (ii) outbreak detection, (iii) the use of game theory in computer security, and (iv) Monte Carlo method in IoT.

2.1. IDSs for IoT

In an IoT network, due to the complex environment, the different standards and communication stacks involved, the limited resources, as well as lack of a physical line of defense (i.e., there are no gateways or switches to monitor the information flow), traditional IDS techniques are difficult to apply. Current IDSs for IoT technologies is focused on the architecture type, and from this point of view, the future development direction of IoT IDS is proposed and evaluated [30]. Zarpelao [8] classified the IDSs into four attributes which include detection method, IDS placement strategy, security threat and validation strategy, and introduced the work of making specific IDS schemes for IoT or developing an attack detection strategy that may be embedded in IDSs. In addition, to promote multi resource sharing and heterogeneous resource demand allocation, Lin [16] recommended an IDS architecture and a resource allocation scheme with edge computing. Sforzin [31] proposed architecture based on limited resource containing devices which can be effectively serve as IDS in IoT. These works have indeed taken into account of the deployment of IDSs, but no dynamic scheduling strategy based on IoT device specific IDSs are involved.

2.2. Outbreak Detection

The second part of work is outbreak detection, which involves deploying a limited number of sensors to detect the spread of an outbreak propagation as early as possible. In previous schemes, the outbreak detection improves the efficiency and accuracy of the algorithm from the perspective of the sensor by exploiting sub-modularity to obtain an approximation value (1-1/e), but not take into account the strategic behavior of the attacker and ignores the setting of the adversarial environment. Obviously, the IoT device without the physical line of defense becomes a target of interest for the attacker. The related works of AOD problem are as follows: Leskovec [10] firstly studied outbreak detection problem and gave an efficient algorithm—Cost-Effective Lazy Forward (CELF) selection—by exploiting sub-modularity which is 700 times faster than a simple greedy algorithm. Many works are proposed to improve the CELF algorithm [22,32,33,34]. Krause [35] first considered the setting of an adversarial environment and proposed a SATURATE algorithm to ensure that the solution is superior to the current best solution, but required a higher cost than CELF. However, this work is focused on a rather static scenario, where the adversary first chooses an initially infected node according to a probability distribution, which is fundamentally different from our case.

2.3. Security Game

The third part of work is a security game that has been used to calculate the optimal allocation of security resources in IoT under an adversarial environment. In view of the traditional game model, there are many deficiencies, such as analysis of complexity, slow convergence speed and the high cost of exchange of information/problems. Semasinghe [36] discussed the multiple uncommon game theory model (e.g., evolutionary game, the average field game, and so on), so as to adapt to the inherent characteristics of IoT network in the future. For the resource allocation problem in IoT, Rullo [37] proposed a linear programming based formulation for solving the problem of optimally placing a set of security resources in static IoT networks, considering a fixed defender budget, the strategic behavior of the attacker, and modeling the interaction between attacker and defender as a Stackelberg game. Altman [38] proposed a game theory-based approach to study jamming attacks in wireless networks. Nmavar [39] distributed the power of the subcarriers to decrease the aggregate bit error rate (BER) for thwarting the jamming attack. Zhu [40] investigated sensor networks by a multi-player game which is formalized to model the non-cooperative strategic behavior between the attackers and the network. Cheng [41] proposed the approach based clustering algorithm and used Pareto to analysis the optimal resource management from the perspective of game theory. In addition, there are some models very similar to the adversarial environment setting in this work, and two categories based on the difference in the player’s strategy space: double oracle [42,43,44] and column generation [45,46,47]. The work provided some methods to optimize the deployment of the sensor for outbreak detection problem, but the scenario setting of these methods are different from ours.

2.4. Monte Carlo Method in IoT

In the field of IoT security, Monte Carlo method is applied to several scenarios. In the mobile Internet of Things scenario, Rullo [48] addressed the problem of security resource allocation by using the Monte Carlo method to generate different device configurations in a geographic area in order to evaluate the proposed method with several network topologies. Xu [17] focused on the transmission design for secure relay communications in IoT networks, where the communication is exposed to eavesdroppers with unknown number and locations, and exploited Monte Carlo model simulations to validate the theoretical result.
The aforementioned work provided some methods to optimize the deployment of sensor for the outbreak detection in IoT and many security games methods based on resource-limited for deploying sensors. However, compare with our work, the scenario setting of these methods, including threat propagation process, utility calculation methods, and so on, are totally different.

3. Adversarial Outbreak Detection Game Model

In this paper, we introduce the attacker factor into the AOD problem and formulate the problem as a Stackelberg game for IoT. In our Stackelberg game, the network manager is the leader who moves first to perform the dispatch of the sensor, and the attacker is the follower who observes the strategy of the leader and responds to it.
In order to clearly describe the whole process of project implementation, the Implementation Process Framework is given in Figure 2, which consists of four stages: preprocessing and initialization, strategy calculation, policy distribution, and strategy execution. In external hardware, the “Processing Time Initialization Table” is generated, the “CG-AOD Algorithm” is called, the signal of schedule is sent. In sensors, the sensor is activated.

3.1. Network

We formulate the communication network deployed with sensors as an undirected graph G ( V , E ) (called a target network), where v V is the node and e E represents the connection between two nodes. In this graph, each node v V can deploy with a sensor, and it can also be the candidate for the attacker. P a r ( v ) ) is the set of the parent node of v . Furthermore, each edge e E has a label denoted by p : E ( 0 , 1 ] to describe the probability of infection propagation through it. For each edge e = ( u , v ) E , p ( u , v ) represents the probability that v is infected by u through the edge ( u , v ) , while if ( u , v ) E , p ( u , v ) : = 0 . Although the structure of the target network varies over time, the critical devices in it, which are often the main targets of attackers, do not change their position frequently after the collector deployed. In other words, the network structure composed of nodes of the deployed collector is stable. Hence, we assume that the network structure is static.

3.2. Virus Propagation

Considering that our work is only to collect IoT device data and detect IoT device state, we exploit the discrete-time infection SI model [22], which is consist of the Susceptible(S) and Infected(I). The SI model used to simulate the outbreak propagation in IoT can be described as follows: Let I t V be the set of nodes that get infected at the step t 0 with I 0 = u . We define J t : = 0 i t I i as the cumulative set of nodes that get infected before step t 0 . Then, at step t + 1 , each infected node u J t may infect its out-neighbors v V \ J t with an independent probability of p ( u , v ) . Thus, a node v V \ J t is infected at step t + 1 with the probability:
1 u J t P a r ( v ) ( 1 p ( u , v ) )
If node v is infected successfully, it will be added into the set I t + 1 . Then J t + 1 will be updated by J t + 1 J t I t + 1 . Note that each infected node has more than one chance to activate its susceptible out-neighbors until they get infected, and each node keeps its infected state once it is infected by others. The cumulative infected process ( J t ) t 0 is Markovian.

3.3. Strategies

A pure defender strategy D = D v is to select k sensors to monitor, i.e., v V D v = k , where D v { 0 , 1 } ,   D v = 1 indicates that the sensors v are opened to monitoring; otherwise, D v = 0 indicates that the sensors v is not opened to monitoring. In other words, the vector D consists of | V | elements, only k of which are 1, and the others are all 0. The defender’s pure strategy space is denoted by D , in which there are ( | V | , k) pure strategies. V D represents a collection of all sensors in strategy D . A mixed defender strategy is a probability distribution over pure strategies, i.e., x = x D with x D representing the probability that D is played, where, D D x D = 1, the sum of all x D is equal to 1. In other words, each pure strategy D corresponds to a probability x D , and the number of x D equals to the number of the pure strategies, that is, ( | V | , k). Note that the number of x D that are not 0 cannot be limited, but usually less than ( | V | , k).
The attacker choose only one node from all nodes in IoT as the source of infection, which is a pure strategy for the attacker. We denote an attacker’s pure strategy as a vector A = A v , where A v = 1 if v V , and the node is selected as the source of infection by the attacker; otherwise, A v = 0. In other words, vector A consists of | V | elements, only one of which is 1, and the others are all 0. The attacker’s pure strategy space is denoted by A , in which there are | V | pure strategies. V A represents a collection of all nodes in strategy A . The attacker’s mixed strategy is denoted by y = y A with y A representing the probability that A is played.

3.4. Utility

As most related works do, we formulate the issue of activating k optimal sensors as a zero-sum game. The defender wants to detect the attacker’s infected node as early as possible, while the attacker tries to keep the period of infection propagation as long as possible. It should be noted that when an infected node is detected, the process of spreading all malicious information in the target network is terminated immediately.
Given defender’s strategy set D and attacker’s strategy set A , if D A = , defender’s strategy and the attacker’s strategy select sets of nodes with no intersection, which means that the defender fails in detecting the infection event, the attacker succeeds, he will gain a payoff P ( A ) = P ( D ) . Otherwise, if D A = 0 , which means that the defender catch the attacker, the defender’s payoff is P ( D ) = P ( A ) . Due to the probability of infection, it is uncertain whether node v D can be successfully infected by the parent node P a r ( v ) . Therefore, the Monte Carlo method is adopted to simulate the infection process for MC times and record every result of each time. We store these records in the “Propagation Time Initialization Table”, as shown in Table 1. The “ Propagation Time Initialization Table” records the time when each node u A V in the network successfully infects other nodes as the source node, and the record of the simulation once. In addition, the “Propagation Time Initialization Table” is an offline table, which is generated in the preprocessing phase in Figure 2. After the preprocessing phase is generated, the “Propagation Time Initialization Table” is stored in external hardware in the form of files, which can be directly read for obtaining in subsequent use.
The time spent in the process of propagation from the infected node u i V to all the nodes v j V in the network can be defined as follows:
α ( u i , v j ) = α ( i , j ) = { 0 , i = j N , i j
where N is a positive integer.
According to the ” Propagation Time Initialization Table”, the time of an attacker’s pure strategy A being detected by the defender’s pure strategy D in the Monte Carlo process is defined as:
t ( A , D ) : = min { min { α ( u i , v j ) | I t V D   w i t h   I 0 = V A } ,   T m a x }
where T m a x is the time interval that we observe.
Since the malicious information successfully infects the neighboring node with a certain probability, using the Monte Carlo method, the detection time τ ( A , D ) indicates the time that a pure strategy A of the attacker performs the malicious information propagation is detected by one of the sensors in the defender’s pure strategy D:
τ ( A , D ) : = 1 M C m = 1 M C t m ( A , D )
The defender’s payoff function is as follows:
P ( D ) = τ ( A , D )
Attacker’s payoff function is P ( A ) = P ( D ) .
The mixed strategy function of the attacker is as follows:
Given a defender’s mixed strategy x and an attacker’s pure strategy A, the expected attacker utility is:
U a ( x , A ) = P ( A ) D D ( 1 z D , A ) x D
where z D , A means that defender’s strategy x overlaps attacker’s strategy A . It should be noted that z is the flag bit here, which is used to facilitate the reader to understand the meaning of the formula, that is, z = 1 if D A ; z = 0   if   D A = . In the following chapters, the meaning of this flag bit has been included in the objective function and constraints, so it does not appear clearly.
Similarly, the attacker’s expected utility U a ( D , y ) of playing mixed strategy y against D is:
U a ( D , y ) = A A ( 1 z D , A ) y A   P ( A )
When both players use mixed strategies, the expected utility of the attacker is:
U a ( x , y ) = D D x D U a ( D , y ) = A A y A U a ( x , A )
The mixed strategy function of the defender is as follows:
Given a defender’s mixed strategy x and an attacker’s pure strategy A , the expected attacker utility is:
U d ( x , A ) = D D ( 1 z D , A ) x D   P ( D )
where, the parameter z in defender’s function is the same as the parameter z in attacker’s function, which will no more details here.
The defender’s expected utility U d ( D , y ) of playing mixed strategy y against D is:
U d ( D , y ) = P ( D ) A A ( 1 z D , A ) y A
When both players use mixed strategies, the expected utility of the attacker is:
U d ( x , y ) = D D x D U d ( D , y ) = A A y A U d ( x ,   A )

3.5. Equilibrium

The Stackelberg equilibrium (SSE) is equal to the Nash equilibrium under the given zero-sum assumption (the defender maximizes the minimum utility, or equivalently, minimizes the maximum attacker utility). Thus, the optimal mixed strategy x of both players can be computed by solving the following linear programming (LP) problem:
max                     U
s . t .     U U d ( x , A )   A A
v V D v = k
D D x D = 1
x D 0   D D
Equation (12) is the optimization goal. Equation (13) enforces that U is the minimum utility. Equation (14) enforces that the defender covers a maximum of k nodes. Equation (15) ensures that the summation of all mixed strategies equal to 1. Equation (16) guarantees that probability of the mixed strategy being chosen is not 0.
When strategy spaces of both players are small, the optimal solution can be obtained by solving the LP. However, with the growing scale of the network | V | , the attacker’s strategy space increases, and the space of the defender’s strategy grows exponentially with the budget k, thus the LP cannot find the optimal solution in a short time. A new algorithm is required to solve the optimal strategy of both sides.

4. Approach

In order to solve the problem in the previous section, the idea of column generation algorithm is introduced [15]. The main idea of the column generation algorithm is to divide the problem into the Optimal Response and the Approximation Response, and the new variable added into the Approximation Response will maximize the value of Optimal Response. The algorithm terminates when the Approximation Response cannot identify any new variables that can improve the value of Optimal Response. The column generation algorithm can effectively reduce the time to obtain the optimal solution when the strategy space of one of the two sides in the game is large. The overall framework of the algorithm is presented in the following section.

4.1. Overview of CG-AOD

An overall flow chart of the column generation algorithm is given in Figure 3. First, after giving the initial strategy, LP is utilized to solve the small-scale game equilibrium, and then loop iteratively to call the Approximation Response and the Optimal Response. It should be noted that the Approximation Response must be called first. If the Approximation Response cannot be found, the Optimal Response is called. When a better strategy for the defender is not found, the algorithm terminates. The final result converges to the global optimal solution.
The algorithm is described in detail using pseudo code as shown in Algorithm 1. CG-AOD is sketched in Algorithm 1. The first line initializes the strategies of the participating parties. The attacker’s initial strategy is to choose a random node as the source of infection, while defender randomly select k nodes as its initial strategy, i.e., D = { v | v V } . Equations (12)–(16) are used in line 5 to solve the equilibrium of both sides. A heuristic algorithm is utilized by Approximation Response to update strategies in line 6. Approximation Response utilizes Mixed Integer Linear Programming (MILP) to obtain the optimal strategy of the defender in line 8. The algorithm terminates when the optimal strategy cannot be found.
Algorithm 1 Overview of CG-AOD
1: I n p u t :   V , A , B ;
2: O u t p u t :   t h e   m i x e d   s t r a t e g i e s   o f   b o t h   p l a y e r s   ( x , y ) ;
3: I n i t i a l i z e   D , A ;
4: repeat;
5:   ( x , y ) CoreLP ( D , A ) ;
6:    D * DAR D ( y ) ;
7:  if D * =   then ;
8:     D * DOR D ( y ) ;
9:     D * D D * ;
10:   u n t i l   D * =   and     A * = ;
11: r e t u r n ( x , y ) ;

4.2. Optimal Response

The defender module consists of two parts: Optimal Response and Approximation Response. Optimal Response, which is responsible for obtaining the optimal response (i.e., optimal strategy) of the defender to the attacker’s mixed strategy, introduced in this section.
Given the attacker’s mixed strategy, the defender needs to find a pure strategy as its optimal response. When the defender’s strategy D satisfying U d ( D , y ) > U d ( x , y ) , the strategy is valid and we add it to the current strategy space D . The Optimal Response thus finds an improving strategy by minimizing U d ( D , y ) over the entire pure strategy space, and is formulated as the following MILP:
m a x A A y A { 1 M C i = 0 M C 1 j = 0 N 1 γ j A ( i ) t j A ( i ) }
s . t . v V D v = k
γ j A ( i ) D j
β j A ( i ) γ j A ( i )
D j t j A ( i ) ( 1 γ j A ( i ) ) M 1 ( 1 β j A ( i ) ) M 2 + D l t l A ( i )   j , l V
D v { 0 , 1 }
γ j A ( i ) { 0 , 1 }
β j A ( i ) { 0 , 1 }
i = 0 M C 1 γ j A ( i ) = 1   f o r   a l l   A   a n d   i
M 1 ,   M 2   a r e   b i g   c o n s t a n t s
Equation (17) is the optimization goal, where t j ( i ) is taken from the “Propagation Time Initialization Table”. Equation (18) enforces that the defender covers at most k nodes. Equations (19)–(25) ensure that the detection time of the outbreak propagation is minimal. Unfortunately, Optimal Response turns out to be NP-hard [44]. Therefore, to speed up the computational process, Approximation Response is required to find one pure strategy that can increase the payoff of defenders. It should be noted that it is not necessary to find the optimal solution in each iteration step, so the Optimal Response is called only when the Approximation Response cannot find such a strategy.
Theorem 1.
The Optimal Response is NP-hard.
Proof 1.
Proof of the Optimal Response can achieve by simplifying a Set-Cover Problem that is also NP-hard. The Set-Cover problem is defined as follows: Given a set of n elements U , and Q 2 U is the subset of U , the goal of the set cover problem is to find k subsets of Q which can cover all the elements of U . We turn an arbitrary set-cover problem into a Optimal Response problem as follows.
First, we build all the sensors as a network G = V , E . For each element i U , a node v labeled { i } is added to the network. For each non-single subset Q Q , we add a node v to the network labeled as Q . The set described above is named as the label set denoted as l ( v ) . For each i U , Q Q , we add an edge between the node labeled as { i } and the node labeled as Q . Then, we construct the support set of the attacker’s mixed strategy, i.e., the set where pure strategy is non-zero. For each element i U , we construct a corresponding attacker’s pure strategy denoted A i = { U i Q , Q Q l 1 ( Q ) } , where l 1 ( Q ) is the node labeled as Q . Then, this strategy is added to the support set. Therefore, the attacker’s support set contains | U | pure strategies.
For example, we assume that U = {1,2,3} and Q = {{1},{2},{3},{1,2},{2,3}}, constructed graph is shown as Figure 4.
The support set of attacker’s mixed strategy contains 3 pure strategies as shown in Table 2.
Then, we prove in the corresponding Optimal Response that the set U can be covered by k subsets in Q if and only if the defender can select all the attacker’s strategies. □
Proof of sufficiency: We assume that the defender can assign k resources to k nodes in the graph to monitor all the attacker’s strategies. B denotes the set of k nodes. It is proved that for v B , the set U can be covered by k sets l ( v ) .
We assume that the set U cannot be covered by k l ( v ) for arbitrary v B , which shows that there is at least one element i U to make i l ( v ) . Note that the attacker’s strategy A i can only be the strategy with a non-zero probability. A i is defined as v A i , i l ( v ) . Thus nodes in A i are not contained in B, and A i is not monitored by k resources, which is contradict with the assumptions.
Proof of necessity: If the set U can be covered by k subsets Q Q and defender can monitor all the attacker’s strategies by assigning k resources to nodes, then these nodes’ label sets are the k subsets of Q . The reason for that can be described as follows. For each { i } U , if there is a node v with i l ( v ) which is covered, then A i will be monitored. If U can be covered by k subsets Q , for each i U , it is at least one of the k subsets. Thus, all attacker’s strategies can be monitored by k resources.

4.3. Approximation Response

The previous section mainly introduces the Optimal Response, while this section focuses on another part called the Approximation Response. The Approximation Response is mainly responsible for finding strategies to improve the payoff of defenders. In this paper, the greedy algorithm is used to calculate the pure strategy for improving the payoff of defenders [49], i.e., U d ( D , y ) > U d ( x , y ) . First, we prove the payoff function is a sub-modularity function, which can get a good solution utilizing the greedy algorithm. A basic conclusion is drawn in literature [50]: for a submodular function, the greedy algorithm implements a constant factor approximation. At least one constant actor (1 − 1/e) can be obtained through the set of greedy algorithm D , which is based on the observation point value obtained by the optimal solution.
Theorem 2.
The greedy algorithm ensures that the accuracy of Approximation Response is 1 − 1/e.
Proof 2.
First, we define the normalized utility function as follows:
( D ) = U d ( D , y ) U d ( , y ) = A y | A D y a P ( A )
Next, we prove the function ( D ) is a submodule. Let v 1 and v 2 be two node sets chosen by the defender, and v 1 v 2 . Let A ¯ 1 and A ¯ 2 be the set of attacker strategies that cannot be monitored by v 1 and v 2 , i.e., A ¯ 1 y | A ¯ 1 v 1 = and A ¯ 2 y | A ¯ 2 v 2 = . We have A ¯ 2 A ¯ 1 because any strategy monitored by v 1 can be monitored by v 2 , thus A ¯ 1 A ¯ 2 . As long as the function ( D ) is submodular, it must satisfy the equation as follows:
( V 1 v ) ( V 1 ) ( V 2 v ) ( V 2 )
Then we have:
( V 1 v ) ( V 1 ) = A y | A ( V 1 v ) y a P ( A ) A y | A D y a P ( A ) = A A ¯ 2 | A v y a P ( A )
For the right-hand side of Equation (28), we can also get:
( V 2 v ) ( V 2 ) = A A ¯ 2 | A v y a P ( A )
Because A ¯ 1 A ¯ 2 , y a P ( A ) > 0 , Equation (28) is proved. Because ( D ) is submodular, the algorithm ensures the (1 − 1/e) accuracy. Pseudo-code is used to describe the greedy algorithm of the Approximation Response in detail, as shown in Algorithm 2.
As presented in Algorithm 2, the greedy algorithm tries to select a valid defender strategy iteratively. Input y is the attacker’s strategy space, but only the strategies with non-zero probabilities are considered. Defender’s strategy set D a p p r o in line 3 is empty at the beginning, and activated sensors are added in D a p p r o for every loop. Lines 4-8 are used for the update. Line 7 iteratively chooses the nodes that bring the largest marginal utility greedily. If no node satisfies the condition, nodes are randomly selected and then a measurement is generated in lines 9-10. Finally, it is required to judge whether the found strategy is valid. If it is valid, it will return, otherwise, it will return null.
Algorithm 2 Approximation Response
1: i n p u t : y   ;
2: o u t p u t :   D ;
3: D a p p r o = ;
4: f o r   v V   d o ;
5:   D { v } ;
6:   w h i l e   | D | < k   d o ;
7:     v * a r g   m a x v U d ( D { v } , y ) ;
8:     D D { v * } ;
9: w h i l e   | D | < B   d o ;
10:       D D { v }   c h o o s e   v   f r o m   V   r a n d o m l y ;
11:   if   U d ( D , y ) > U d ( x , y )   t h e n ;
12:      D a p p r o = D a p p r o { D } ;
13:     r e t u r n   D a p p r o ;
14:   else;
15:   return null.
 □

5. Experimental Evaluation

In this section, we first evaluate the performance of our approach through a numerical example to demonstrate the validity of our approach in Section 4. Then, we test our algorithms on synthetic networks, and analyze the algorithms from the aspects of solution quality, scalability and robustness. All algorithms were run on a 3.20 GHz CPU loads with quad-cores and 16.00 GB memory using Windows 10. All linear programming involved is calculated using the solution software CPLEX (version 12.6). Since uncertainty is involved in the model, we run the simulation 100 times for obtaining each average result (the number 100 comes from the discussion “how many simulation runs are needed before obtaining an average result?” in [51]).

5.1. Numerical Example

In this part, we use a numerical example to verify the validity of the CG-AOD algorithm which included Optimal Response and Approximation Response. Given an undirected network G , as shown in Figure 5, the undirected graph has seven devices which are embedded with specific IDS. The solid line in the Figure 5 represents the link state of two devices, while the dotted line represents the unstable link relationship between devices. For simplicity, only seven nodes V = { v 0 , v 1 , , v 6 } with stable links are selected for calculation. The label corresponding to each edge is represented as p = 0.1 . Among them, the maximum monitoring time is T m a x = 10 , the budget of each defender strategy is k = 3 .
We calculate this numerical example by exploiting the mathematical programming in Equations (12)–(16), and the final exact solution is 2.78624. In the other words, the best time result of the detection by the defender for the outbreak propagation is 2.78624 seconds. We use the CG-AOD algorithm to solve the example given in Figure 5, and show the execution results of the algorithm and the process of CG-AOD in Table 3, which presents the nodes included in the two players’ strategy sets and the utility of the attackers in each time step.
When the time step is 1, it is the initialization strategy. Each time step loop calls the Approximation Response and Optimal Response to select defender strategy and calculates the Nash equilibrium of the two players under the current strategy.

5.2. Solution Quality Analysis

In this section, we conduct experiments on synthetic graph and generate synthetic graphs from graph models: the Barabási-Albert, which is scale-free networks (BA(r)) and where each vertex is connected to m incumbents using a preferential attachment mechanism [52]. The distribution in the scale-free network satisfies the power law, which includes a large number of nodes with small degrees. Besides, the networks of different sizes can be generated by modifying parameters to evaluate the performance of the algorithm at different averaging. To establish a scale-free network, it is needed to be aware that when the new node v and the side of v exist are directed. We use BA scale-free network with parameters r = 2,4, labeled BA(2), and BA(4), respectively. For example, BA(2) indicates that there are two initial nodes, and each new node is connected with two existing nodes, thus forming a scale-free network.

5.2.1. Comparison of the Approximation Solution with the Optimal Solution

Approximation. With the increase of network scale, the computational complexity increases, so that the results of CG-AOD algorithm cannot be obtained within a limited time. And thus we only run CG-AOD/Appro algorithm, which is one part of CG-AOD algorithm and without Optimal Response. In the BA(2) network, k = 2, we give the process of solving the global optimal solution directly using the mathematical programming in Equations (17)–(26) and compare CG-AOD/Appro algorithm with the CG-AOD algorithm. The experiment result shows that the approximate value of the solution quality of the CG-AOD/Appro algorithm and the CG-AOD algorithm is about 90%, as shown in Figure 6a. In the BA(2) network, k = 3, only a part of optimal solutions are obtained. As the number of sensors increases, the Optimal Response part will run out of resources in the calculation, so it cannot give all the optimal solutions. Nevertheless, it is not difficult to see that the approximate solution and the optimal solution given directly follow an approximate degree of more than 90%, which is higher than that at k = 2, as shown in Figure 6c. For BA(4), k = 4 has a similar result, as shown in Figure 6e.
Scalability Analysis. We compare the scalability of the two methods under different resource numbers on BA(2) networks, as shown in Figure 6b–f. When the network and budget are relatively small, the difference of run time of CG-AOD and CG-AOD/Appro algorithm is little, but the CG-AOD/Appro algorithm performs better on large-scale networks, and can give the calculation results in a relatively short time. In Figure 6d,f, the complete solution of CG-AOD is not given, because the runtime of CG-AOD exponentially increases with the size. It is difficult to get results in a short time when the network size and budget are large. Overall, CG-AOD/Appro performs better than CG-AOD and can be scaled up to realistic-sized problems.

5.2.2. Comparison of the CG-AOD/Appro Algorithm with Other Benchmark Methods

In this section, we choose six benchmark methods as a comparison to evaluate the solution quality of the CG-AOD/Appro algorithm in a complex network.
Benchmark methods. We introduce three pure measure baselines of heuristic algorithms and three mixed measure baselines of heuristic algorithms. Different strategies of defender choosing in the benchmark are shown as follows:
  • RP: the defender randomly opens k nodes for monitoring, and the attacker randomly selects a node as the source node of the infection.
  • DCP [53]: the defender, according to the node degree value, selects the nodes to monitor, and then the attacker makes the Optimal Response according to the defender’s pure strategy.
  • CELF [10]: the defender uses the CELF algorithm that is the classical greedy algorithm to choose k nodes for the sensor.
  • RM: a defender mixed strategy where the marginal coverage probability of each vertex is a random value.
  • DCM: a defender mixed strategy where the marginal coverage probability of each vertex is normalized degree centrality.
CELF-M: a defender mixed strategy where the marginal coverage probability of each vertex is normalized CELF value-based centrality. Solution Quality Analysis. In Figure 7a–b, we compare the solution quality obtained from our approaches with those obtained from 6 heuristic baselines. Results show that the solutions of all the heuristic baselines are not ideal in general and become worse with the increasing network size, while CG-AOD/Appro can always achieve an almost optimal solution, which is the closest to the solution given by CG-AOD. The performance of RP is dramatically worse in all cases because it did not consider the network structure. The performance of all mixed strategy heuristics (i.e., RM, DCM, and CELF-M) is much better than the corresponding pure strategy-based heuristics (i.e., RP, DCP, and CELF), confirming the necessity of using randomized dynamic monitoring schedules. The good performance of CG-AOD/Appro indicates that our scheme has a better effective response.
Robustness. We compare the utility of CG-AOD/Appro under different the number of defender resources. Figure 7c shows a decreasing efficiency of CG-AOD/Appro which is faster than the other 6 heuristic baselines. The solutions are still near-optimal and outperform other heuristic algorithms significantly.
The above experiments show that the solutions of all the baselines are not ideal in general and become worse with the increasing network size when the defender strategy obtained from the six baselines, while CG-AOD/Appro can always obtain almost the optimal solution. CG-AOD/Appro offers significant performance and robustness.

6. Conclusions

In this paper, we investigate the problem of adversarial outbreak detection (AOD) in the IoT, in which a network defender aims to detect the attacker as soon as possible by generating a dynamic scheduling strategy in the network. There are two key issues to be considered: (1) IoT devices usually have limited resources and the sensors cannot detect the outbreak propagation continuously; (2) the IoT devices are usually expose to the public situation, and the attacker can strategically employ analytical tools to maximize the influence of worms’ propagation. We present the work through applying Stackelberg security games for outbreak detection in the adversarial environment and study the strategies and utility of both players. Firstly, we formulate the interaction between the defender and the attacker as a Stackelberg game. Secondly, we build a modified Column Generation framework for computing the optimal strategy effectively and construct the optimal response of defenders as a mixed-integer linear programming (MILPs), and prove that solving the optimal response of defenders is an NP-hard problem. Then, the optimal response of defenders are improved by using an approximate algorithm-greedy algorithm. Finally, we demonstrate the effectiveness, scalability and robustness of our scheme through experiments.

Author Contributions

Conceptualization, Z.W.; methodology, L.C.; writing—original draft preparation, L.C.; writing—review and editing, Z.W. and K.G.; supervision, Y.G.; funding acquisition, F.L. and K.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Project (No.2016YFB0801001), the Natural Science Foundation of China (No.U1836203), and by the Youth Innovation Promotion Association CAS (2019160).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Li, S.; Xu, L.; Zhao, S. The Internet of Things: A Survey; Kluwer Academic Publishers: Dordrecht, The Netherlands, 2015; pp. 243–259. [Google Scholar]
  2. Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of things Security: A Survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
  3. Wang, T.; Wu, Q.; Wen, S.; Cai, Y.; Tian, H.; Chen, Y.; Wang, B. Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks. Sensors 2017, 17, 139. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  4. Kolias, C.; Kambourakis, G.; Stavrou, A.; Jeffrey, M.S. DDoS in the IoT. Mirai and Other Botnets. IEEE Comput. 2017, 50, 80–84. [Google Scholar] [CrossRef]
  5. Kaspersky. Available online: https://www.kaspersky.com/blog/attack-on-dyn-explained/13325/ (accessed on 31 January 2020).
  6. Csoonline. Available online: https://www.csoonline.com/article/3227906/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html (accessed on 31 January 2020).
  7. ZDNet. Available online: https://www.zdnet.com/article/iot-security-warning-cyber-attacks-on-medical-devices-could-put-patients-at-risk/ (accessed on 31 January 2020).
  8. Zarpelao, B.B.; Miani, R.S.; Kawakani, C.T.; de Alvarenga, S.C. A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 2017, 84, 25–37. [Google Scholar] [CrossRef]
  9. Sharma, S.; Kaul, A. A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud. Veh. Commun. 2018, 12, 138–164. [Google Scholar] [CrossRef]
  10. Leskovec, J.; Krause, A.; Guestrin, C.; Faloutsos, C.; Faloutsos, C.; VanBriesen, J.; Glance, N. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, CA, USA, 12–15 August 2007; pp. 420–429. [Google Scholar]
  11. Krause, A.; Guestrin, C. Optimizing Sensing: From Water to the Web. IEEE Comput. 2009, 42, 38–45. [Google Scholar] [CrossRef] [Green Version]
  12. Krause, A.; Rajagopal, R.; Gupta, A.; Guestrin, C. Simultaneous optimization of sensor placements and balanced schedules. IEEE Trans. Automat. Contr. 2011, 56, 2390–2405. [Google Scholar] [CrossRef]
  13. Sela, P.L.; Abbas, W.; Koutsoukos, X.; Amin, S. Sensor placement for fault location identification in water networks: A minimum test cover approach. Automatica 2016, 72, 1–16. [Google Scholar]
  14. Jung, D.; Kim, J.H. Using mechanical reliability in multiobjective optimal meter placement for pipe burst detection. J. Water Resour. Plan. Manag. 2018, 144, 04018031. [Google Scholar] [CrossRef]
  15. Shakarian, P.; Lei, H.; Lindelauf, R. Power grid defense against malicious cascading failure. In Proceedings of the 2014 International Conference on Autonomous Agents and Multi-Agent Systems, Paris, France, 5–9 May 2014; pp. 813–820. [Google Scholar]
  16. Lin, F.H.; Zhou, Y.; An, X.; You, I.; Choo, K.K.R. Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices. IEEE Consum. Electron. Mag. 2018, 7, 45–50. [Google Scholar] [CrossRef]
  17. Xu, Q.; Ren, P.; Song, H.; Du, Q. Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access 2016, 4, 2840–2853. [Google Scholar] [CrossRef]
  18. Veerappan, C.S.; Keong, P.L.K.; Tang, Z.; Tan, F. Taxonomy on malware evasion countermeasures techniques. In Proceedings of the IEEE World Forum on Internet of Things, Singapore, 5–8 February 2018; pp. 558–563. [Google Scholar]
  19. Hu, H.; Wang, M.; Ouyang, M.; Hu, G. Toward Network Worm Victims Identification Based on Cascading Motif Discovery. Electronics 2019, 9, 1. [Google Scholar] [CrossRef] [Green Version]
  20. Bethencourt, J.; Franklin, J.; Vernon, M.K. Mapping Internet Sensors with Probe Response Attacks. In Proceedings of the USENIX Security Symposium, Baltimore, MD, USA, 31 July–5 August 2005; pp. 193–208. [Google Scholar]
  21. Hu, F. Security and privacy in Internet of things (IoTs): Models, Algorithms, and Implementations; CRC Press: Boca Raton, FL, USA, 2016; pp. 70–78. [Google Scholar]
  22. Zhou, C.; Lu, W.X.; Zhang, J.; Li, L.; Hu, Y.; Guo, L. Early detection of dynamic harmful cascades in large-scale networks. J. Comput. Sci-Neth. 2018, 28, 304–317. [Google Scholar] [CrossRef]
  23. Acarali, D.; Rajarajan, M.; Komninos, N.; Zarpelão, B.B. Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks. Secur. Commun. Netw. 2019, 2019, 3745619:1–3745619:13. [Google Scholar] [CrossRef]
  24. Sedjelmaci, H.; Senouci, S.M.; Al-Bahri, M. A lightweight anomaly detection technique for low-resource IoT devices: A game-theoretic methodology. In Proceedings of the IEEE International Conference on Communications, Kuala Lumpur, Malaysia, 22–27 May 2016; pp. 1–6. [Google Scholar]
  25. Liu, B.; Xu, H.; Zhou, X. Stackelberg Dynamic Game-Based Resource Allocation in Threat Defense for Internet of Things. Sensors 2018, 18, 4074. [Google Scholar] [CrossRef] [Green Version]
  26. Sohail, M.; Khan, S.; Ahmad, R.; Singh, D.; Lloret, J. Game Theoretic Solution for Power Management in IoT-Based Wireless Sensor Networks. Sensors 2019, 19, 3835. [Google Scholar] [CrossRef] [Green Version]
  27. Krause, A.; Guestrin, C. Submodularity and its Applications in Optimized Information Gathering. ACM TIST 2011, 2, 1–20. [Google Scholar] [CrossRef]
  28. Huang, C.T.; Sakib, M.N.; Njilla, L.; Kamhoua, C. A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak. In Proceedings of the International Conference on Computing, Networking and Communications, Honolulu, HI, USA, 18–21 February 2019; pp. 457–462. [Google Scholar]
  29. Robert, C.; George, C. Monte Carlo Statistical Methods. 2013. Available online: https://books.google.com.hk/books?hl=en&lr=&id=lrvfBwAAQBAJ&oi=fnd&pg=PR17&dq=Monte+Carlo+statistical+methods&ots=GNEp5duzJ5&sig=Oe3pCPujDaKSK25qQ4eoT_OrKDU&redir_esc=y&hl=zh-CN&sourceid=cndr#v=onepage&q=Monte%20Carlo%20statistical%20methods&f=false (accessed on 31 January 2020).
  30. Benkhelifa, E.; Welsh, T.; Hamouda, W. A critical review of practices and challenges in intrusion detection systems for IoT: Toward universal and resilient systems. IEEE Commun. Suvr. Tut. 2018, 20, 3496–3509. [Google Scholar] [CrossRef]
  31. Sforzin, A.; Mármol, F.G.; Conti, M.; Bohli, J.M. RPiDS: Raspberry Pi IDS—A Fruitful Intrusion Detection System for IoT. In Proceedings of the IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress, Toulouse, France, 18–21 July 2016; pp. 440–448. [Google Scholar]
  32. Peng, Y.; Yang, J.; Wu, C.; Guo, C.; Hu, C.; Li, Z. deTector: A Topology-aware Monitoring System for Data Center Networks. In Proceedings of the USENIX Annual Technical Conference, Santa Clara, CA, USA, 12–14 July 2017; pp. 55–68. [Google Scholar]
  33. Yu, Y.; Xiao, G. On early detection of strong infections in complex networks. J. Phys. A-Math. Thero. 2014, 47, 881–892. [Google Scholar] [CrossRef]
  34. Zhang, H.; Alim, M.A.; Thai, M.T.; Nguyen, H.T. Monitor placement to timely detect misinformation in Online Social Networks. In Proceedings of the IEEE International Conference on Communications, London, UK, 8–12 June 2015; pp. 1152–1157. [Google Scholar]
  35. Krause, A.; McMahan, B.; Guestrin, C.; Gupta, A. Selecting Observations against Adversarial Objectives. In Proceedings of the Advances in Neural Information Processing Systems, Vancouver, BC, Canada, 3–6 December 2007; pp. 777–784. [Google Scholar]
  36. Semasinghe, P.; Maghsudi, S.; Hossain, E. Game theoretic mechanisms for resource management in massive wireless IoT systems. IEEE Commun. Mag. 2017, 55, 121–127. [Google Scholar] [CrossRef]
  37. Rullo, A.; Midi, D.; Serra, E.; Bertino, E. Pareto optimal security resource allocation for Internet of Things. TOPS 2017, 20, 1–30. [Google Scholar] [CrossRef]
  38. Altman, E.; Avrachenkov, K.; Garnaev, A. Jamming in wireless networks: The case of several jammers. In Proceedings of the 2009 International Conference on Game Theory for Networks, Istanbul, Turkey, 13–15 May 2009; pp. 585–592. [Google Scholar]
  39. Namvar, N.; Saad, W.; Bahadori, N.; Kelley, B. Jamming in the Internet of Things: A Game-Theoretic Perspective. In Proceedings of the IEEE Global Communications Conference, Washington, DC, USA, 4–8 December 2016; pp. 1–6. [Google Scholar]
  40. Zhu, Q.; Bushnell, L.; Başar, T. Game-theoretic analysis of node capture and cloning attack with multiple attackers in wireless sensor networks. In Proceedings of the 51th IEEE Conference on Decision and Control, Maui, HI, USA, 10–13 December 2012; pp. 3404–3411. [Google Scholar]
  41. Cheng, H.T.; Zhuang, W. Pareto optimal resource management for wireless mesh networks with QoS assurance: joint node clustering and subcarrier allocation. IEEE T. Wirel. Commun. 2009, 8, 1573–1583. [Google Scholar] [CrossRef] [Green Version]
  42. Tsai, J.; Nguyen, T.H.; Tambe, M. Security Games for Controlling Contagion. In Proceedings of the 26th AAAI Conference on Artificial Intelligence, Toronto, ON, Canada, 22–26 July 2012; pp. 1464–1470. [Google Scholar]
  43. Yin, Y.; An, B.; Jain, M. Game-theoretic resource allocation for protecting large public events. In Proceedings of the 28th AAAI Conference on Artificial Intelligence, Quebec, QC, Canada, 27–31 July 2014; pp. 826–834. [Google Scholar]
  44. Wang, Z.; Yin, Y.; An, B. Computing Optimal Monitoring Strategy for Detecting Terrorist Plots. In Proceedings of the of the 30th AAAI Conference on Artificial Intelligence, Phoenix, AZ, USA, 12–17 February 2016; pp. 637–643. [Google Scholar]
  45. Jain, M.; Kardes, E.; Kiekintveld, C.; Ordónez, F.; Tambe, M. Security Games with Arbitrary Schedules: A Branch and Price Approach. In Proceedings of the 24th AAAI Conference on Artificial Intelligence, Atlanta, GA, USA, 11–15 July 2010; pp. 792–797. [Google Scholar]
  46. Jain, M.; Kardes, E.; Kiekintveld, C.; Ordónez, F.; Tambe, M. Security games with protection externalities. In Proceedings of the 29th AAAI Conference on Artificial Intelligence, Austin, TX, USA, 25–30 January 2015; pp. 914–920. [Google Scholar]
  47. Hu, X.; Zhu, W.; An, B.; Jin, P.; Xia, W. A branch and price algorithm for EOS constellation imaging and downloading integrated scheduling problem. Comput & OR 2019, 104, 74–89. [Google Scholar]
  48. Rullo, A.; Serra, E.; Bertino, E.; Lobo, J. Shortfall-based optimal placement of security resources for mobile IoT scenarios. In Proceedings of the European Symposium on Research in Computer Security, Oslo, Norway, 11–15 September 2017; pp. 419–436. [Google Scholar]
  49. Serra, E.; Jajodia, S.; Pugliese, A.; Rullo, A.; Subrahmanian, V.S. Pareto-Optima Adversarial Defense of Enterprise Systems. ACM Tans. Inf. Syst. Secur. 2015, 17, 1–39. [Google Scholar] [CrossRef]
  50. Nemhauser, G.L.; Wolsey, L.A.; Fisher, M.L. An analysis of approximations for maximizing submodular set functions—I. Math. Program. 1978, 14, 265–294. [Google Scholar] [CrossRef]
  51. Wen, S.; Zhou, W.; Zhang, J.; Xiang, Y.; Zhou, W.; Jia, W.; Zou, C.C. Modeling and analysis on the propagation dynamics of modern email malware. IEEE Trans. Dependable. Secure. Comput. 2014, 11, 361–374. [Google Scholar] [CrossRef]
  52. Barabási, A.L.; Albert, R. Emergence of scaling in random networks. Science 1999, 286, 509–512. [Google Scholar]
  53. Tsai, J.; Yin, Z.; Kwak, J.Y.; Kempe, D.; Kiehintveld, C.; Tambe, M. Urban Security: Game-Theoretic Resource Allocation in Networked Domains. In Proceedings of the 24th AAAI Conference on Artificial Intelligence, Atlanta, GA, USA, 11–15 July 2010; 2010; pp. 881–886. [Google Scholar]
Figure 1. Propagation Trajectory.
Figure 1. Propagation Trajectory.
Sensors 20 00804 g001
Figure 2. Implementation Process Framework.
Figure 2. Implementation Process Framework.
Sensors 20 00804 g002
Figure 3. CG-AOD Framework.
Figure 3. CG-AOD Framework.
Sensors 20 00804 g003
Figure 4. Constructed Graph.
Figure 4. Constructed Graph.
Sensors 20 00804 g004
Figure 5. Small Network Graph.
Figure 5. Small Network Graph.
Sensors 20 00804 g005
Figure 6. The Utility (a) and Runtime (bd) of CG-AOD and CG-AOD/Appro (e,f).
Figure 6. The Utility (a) and Runtime (bd) of CG-AOD and CG-AOD/Appro (e,f).
Sensors 20 00804 g006aSensors 20 00804 g006b
Figure 7. The performance of CG-AOD/Appro on synthetic networks against attackers (ac).
Figure 7. The performance of CG-AOD/Appro on synthetic networks against attackers (ac).
Sensors 20 00804 g007
Table 1. Propagation Time Initialization Table.
Table 1. Propagation Time Initialization Table.
Node v 0 v 1 v j v n
u 0 0 α ( 0 , 1 ) α ( 0 , j ) α ( 0 , n )
u 1 α ( 1 , 0 ) 0 α ( 1 , j ) α ( 1 , n )
u i α ( i , 0 ) α ( i , 1 ) α ( i , j ) α ( i , n )
u n α ( n , 0 ) α ( n , 1 ) α ( n , j ) 0
Table 2. Mixed Strategy.
Table 2. Mixed Strategy.
Pure StrategyCorresponding Element in UVertices
A 1 1 { v 1 , v 2 }
A 2 2 { v 2 , v 3 , v 4 }
A 3 3 { v 4 , v 5 }
Table 3. The Process of CG-AOD.
Table 3. The Process of CG-AOD.
STEPAttacker StrategyDefender StrategyPayoff
1 { v 0 } , { v 1 } , { v 2 } , { v 3 } , { v 4 } , { v 5 } , { v 6 } { v 4 , v 5 , v 3 }
Equilibrium { v 6 } ( 1 ) { v 4 , v 5 , v 3 }(1)9
2 { v 0 } , { v 1 } , { v 2 } , { v 3 } , { v 4 } , { v 5 } , { v 6 } { v 4 , v 5 , v 3 },{ v 4 , v 5 , v 6 }
Equilibrium { v 2 } (0.891089)
{ v 6 } (0.108911)
{ v 4 , v 5 , v 3 }(0.613861)
{ v 4 , v 5 , v 6 }(0.386139)
5.52475
3 { v 0 } , { v 1 } , { v 2 } , { v 3 } , { v 4 } , { v 5 } , { v 6 } { v 4 , v 5 , v 3 },{ v 4 , v 5 , v 6 },
{ v 2 , v 5 , v 6 }
Equilibrium { v 3 } (0.473684)
{ v 6 } (0.526316)
{ v 4 , v 5 , v 6 } (0.526316)
{ v 2 , v 5 , v 6 }(0.473684)
4.73684
4 { v 0 } , { v 1 } , { v 2 } , { v 3 } , { v 4 } , { v 5 } , { v 6 } { v 4 , v 5 , v 3 },{ v 4 , v 5 , v 6 },
{ v 2 , v 5 , v 6 },{ v 3 , v 5 , v 6 }
Equilibrium { v 0 } (0.99099)
{ v 3 } (0.00990099)
{ v 4 , v 5 , v 3 }(0.418042)
{ v 2 , v 5 , v 6 }(0.376238)
{ v 3 , v 5 , v 6 }(0.205721)
3.76238
5 { v 0 } , { v 1 } , { v 2 } , { v 3 } , { v 4 } , { v 5 } , { v 6 } { v 4 , v 5 , v 3 },{ v 4 , v 5 , v 6 },
{ v 2 , v 5 , v 6 },{ v 3 , v 5 , v 6 },
{ v 0 , v 3 , v 6 }
Equilibrium { v 1 } (0.898204)
{ v 3 } (0.0718563)
{ v 6 } (0.0299401)
{ v 4 , v 5 , v 3 }(0.409182)
{ v 2 , v 5 , v 6 }(0.368263)
{ v 0 , v 3 , v 6 }(0.222555)
3.68263
6 { v 0 } , { v 1 } , { v 2 } , { v 3 } , { v 4 } , { v 5 } , { v 6 } { v 4 , v 5 , v 3 },{ v 4 , v 5 , v 6 },
{ v 2 , v 5 , v 6 },{ v 3 , v 5 , v 6 },
{ v 0 , v 3 , v 6 },{ v 1 , v 3 , v 6 }
Equilibrium { v 1 } (0.0539423)
{ v 2 } (0.552908)
{ v 3 } (0.33606)
{ v 6 } (0.0570889)
{ v 4 , v 5 , v 3 }(0.393179)
{ v 2 , v 5 , v 6 }(0.353861)
{ v 3 , v 5 , v 6 }(0.213851)
{ v 1 , v 3 , v 6 }(0.0391082)
3.53861
7 { v 0 } , { v 1 } , { v 2 } , { v 3 } , { v 4 } , { v 5 } , { v 6 } { v 4 , v 5 , v 3 },{ v 4 , v 5 , v 6 },
{ v 2 , v 5 , v 6 },{ v 3 , v 5 , v 6 },
{ v 0 , v 3 , v 6 },{ v 1 , v 3 , v 6 },
{ v 2 , v 3 , v 6 }
Equilibrium { v 0 } (0.239721)
{ v 1 } ( 0.421699 )
{ v 2 } (0.129297)
{ v 3 } (0.0127931)
{ v 4 } (0.196489)
{ v 4 , v 5 , v 6 }(0.275675)
{ v 2 , v 5 , v 6 }(0.317281)
{ v 0 , v 3 , v 6 }(0.150301)
{ v 1 , v 3 , v 6 }(0.135167)
{ v 2 , v 3 , v 6 }(0.121576)
3.17281
8 { v 0 } , { v 1 } , { v 2 } , { v 3 } , { v 4 } , { v 5 } , { v 6 } { v 4 , v 5 , v 3 },{ v 4 , v 5 , v 6 },
{ v 2 , v 5 , v 6 },{ v 3 , v 5 , v 6 },
{ v 0 , v 3 , v 6 },{ v 1 , v 3 , v 6 },
{ v 2 , v 3 , v 6 },{ v 0 , v 1 , v 4 }
Equilibrium { v 0 } (0.175687)
{ v 1 } (0.183212)
{ v 2 } (0.208893)
{ v 3 } (0.17239)
{ v 5 } (0.198778)
{ v 6 } (0.061041)
{ v 4 , v 5 , v 3 }(0.268945)
{ v 2 , v 5 , v 6 }(0.239261)
{ v 0 , v 3 , v 6 }(0.106774)
{ v 1 , v 3 , v 6 }(0.100118)
{ v 2 , v 3 , v 6 }(0.191897)
{ v 0 , v 1 , v 4 }(0.0930045)
2.97854
9 { v 0 } , { v 1 } , { v 2 } , { v 3 } , { v 4 } , { v 5 } , { v 6 } { v 4 , v 5 , v 3 },{ v 4 , v 5 , v 6 },
{ v 2 , v 5 , v 6 },{ v 3 , v 5 , v 6 },
{ v 0 , v 3 , v 6 },{ v 1 , v 3 , v 6 },
{ v 2 , v 3 , v 6 },{ v 0 , v 1 , v 4 },
{ v 2 , v 3 , v 5 }
Equilibrium { v 0 } (0.01404)
{ v 1 } (0.211501)
{ v 2 } (0.0971293)
{ v 3 } (0.140188)
{ v 4 } (0.198705)
{ v 5 } (0.163512)
{ v 6 } (0.174924)
{ v 4 , v 5 , v 6 } (0.22779)
{ v 2 , v 5 , v 6 }(0.236859)
{ v 0 , v 3 , v 6 }(0.121694)
{ v 1 , v 3 , v 6 } (0.113244)
{ v 2 , v 3 , v 6 }(0.171224)
{ v 0 , v 1 , v 4 } (0.088595)
{ v 2 , v 3 , v 5 }(0.0405945)
2.92673
10 { v 0 } , { v 1 } , { v 2 } , { v 3 } , { v 4 } , { v 5 } , { v 6 } { v 4 , v 5 , v 3 },{ v 4 , v 5 , v 6 },
{ v 2 , v 5 , v 6 },{ v 3 , v 5 , v 6 },
{ v 0 , v 3 , v 6 },{ v 1 , v 3 , v 6 },
{ v 2 , v 3 , v 6 },{ v 0 , v 1 , v 4 },
{ v 2 , v 3 , v 5 },{ v 1 , v 3 , v 4 }
Equilibrium { v 0 } (0.00326235)
{ v 1 } (0.0742531)
{ v 2 } (0.122845)
{ v 3 } (0.169188)
{ v 4 } (0.215608)
{ v 4 } (0.2072)
{ v 6 } (0.174924)
{ v 4 , v 5 , v 3 } (0.0268422)
{ v 2 , v 5 , v 6 } (0.278986)
{ v 0 , v 3 , v 6 }(0.0251817)
{ v 2 , v 3 , v 6 }(0.056574)
{ v 2 , v 3 , v 5 }(0.134177)
{ v 1 , v 3 , v 4 } (0.230782)
2.78986
11 { v 0 } , { v 1 } , { v 2 } , { v 3 } , { v 4 } , { v 5 } , { v 6 } { v 4 , v 5 , v 3 },{ v 4 , v 5 , v 6 },
{ v 2 , v 5 , v 6 },{ v 3 , v 5 , v 6 },
{ v 0 , v 3 , v 6 },{ v 1 , v 3 , v 6 },
{ v 2 , v 3 , v 6 },{ v 0 , v 1 , v 4 },
{ v 2 , v 3 , v 5 },{ v 1 , v 3 , v 4 }
{ v 3 , v 4 , v 6 }
Equilibrium { v 0 } (0.0176406)
{ v 1 } ( 0.103868 )
{ v 2 } (0.124691)
{ v 3 } (0.165048)
{ v 4 } (0.186597)
{ v 5 } (0.199553)
{ v 6 } (0.202604)
{ v 2 , v 5 , v 6 }(0.278624)
{ v 0 , v 3 , v 6 } (0.0248471)
{ v 0 , v 3 , v 6 }(0.246089)
{ v 2 , v 3 , v 6 }(0.029415)
{ v 2 , v 3 , v 5 } (0.162656)
{ v 1 , v 3 , v 4 } (0.230108)
{ v 3 , v 4 , v 6 }(0.0282604)
2.78624

Share and Cite

MDPI and ACS Style

Chen, L.; Wang, Z.; Li, F.; Guo, Y.; Geng, K. A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things. Sensors 2020, 20, 804. https://doi.org/10.3390/s20030804

AMA Style

Chen L, Wang Z, Li F, Guo Y, Geng K. A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things. Sensors. 2020; 20(3):804. https://doi.org/10.3390/s20030804

Chicago/Turabian Style

Chen, Lili, Zhen Wang, Fenghua Li, Yunchuan Guo, and Kui Geng. 2020. "A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things" Sensors 20, no. 3: 804. https://doi.org/10.3390/s20030804

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop