Skip to main content

Network Defense Resource Allocation Scheme with Multi-armed Bandits

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2022)

Abstract

The problem of limited defense resources owned by the network platform needs to be solved by designing a reasonable defense resource allocation scheme in Industrial Internet of Things (IIoT). However, most of the previously studied defense resource allocation schemes do not consider the impact of network cheat on the defender’s total expected utility, resulting in the defender’s total expected utility not being optimal. To address this problem, this paper proposes a network defense resource allocation scheme with multi-armed bandits (NDRAS) to maximize the defender’s total expected utility. The scheme first proposes a random generation method of node shell configuration based on network cheat, by considering the impact of network cheat on the defender’s total expected utility, masking information about the real configuration of nodes, to increase the uncertainty of the attacker’s attack on each node and thus reduce the likelihood of the attacker’s success. Subsequently, the decomposability and Lipschitz continuity of the defender’s total expected utility is exploited to reduce the gap between the cumulative discrete optimal benefit and the continuous optimal benefit, to maximize the defender’s total expected utility and thus make the defender’s total expected utility optimal. Finally, the detailed experimental results confirm the effectiveness of NDRAS, indicating that the new scheme can give a reasonable defense resource allocation scheme to maximize the defender’s total expected utility.

Supported by the National Natural Science Foundation of China (NSFC) under Grant No. 62172377 and 61872205, and the Natural Science Foundation of Shandong Province under Grant No. ZR2019MF018.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhifang, G., Chen, H., Pingping, X., Li, Y., Vucetic, B.: Physical layer authentication for non-coherent massive SIMO-enabled industrial IoT communications. IEEE Trans. Inf. Forensics Secur. 15, 3722–3733 (2020)

    Article  Google Scholar 

  2. Zheng, C., Fan, X., Wang, C., Qi, J.: GMAN: a graph multi-attention network for traffic prediction. Proc. AAAI Conf. Artif. Intell. 34, 1234–1241 (2020)

    Google Scholar 

  3. Wang, Y., et al.: Deep reinforcement learning for green security games with real-time information. Proc. AAAI Conf. Artif. Intell. 33, 1401–1408 (2019)

    Google Scholar 

  4. Macke, W., Mirsky, R., Stone, P.: Expected value of communication for planning in ad hoc teamwork. Proc. AAAI Conf. Artif. Intell. 35, 11290–11298 (2021)

    Google Scholar 

  5. Zhang, Y., Guo, Q., An, B., Tran-Thanh, L., Jennings, N.R.: Optimal interdiction of urban criminals with the aid of real-time information. Proc. AAAI Conf. Artif. Intell. 33, 1262–1269 (2019)

    Google Scholar 

  6. Li, M., Tran-Thanh, L., Xiaowei, W.: Defending with shared resources on a network. Proc. AAAI Conf. Artif. Intell. 34, 2111–2118 (2020)

    Google Scholar 

  7. Shen, W., Chen, W., Huang, T., Singh, R., Fang, F.: When to follow the tip: security games with strategic informants. In: Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence (2020)

    Google Scholar 

  8. Kleinberg, R., Slivkins, A., Upfal, E.: Bandits and experts in metric spaces. J. ACM 66(4), 1–77 (2019)

    Article  MathSciNet  MATH  Google Scholar 

  9. Chen, W., Wang, Y., Yuan, Y., Wang, Q.: Combinatorial multi-armed bandit and its extension to probabilistically triggered arms. J. Mach. Learn. Res. 17(1), 1746–1778 (2016)

    MathSciNet  MATH  Google Scholar 

  10. Lily, X., Bondi, E., Fang, F., Perrault, A., Wang, K., Tambe, M.: Dual-mandate patrols: multi-armed bandits for green security. Proc. AAAI Conf. Artif. Intell. 35, 14974–14982 (2021)

    Google Scholar 

  11. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Comput. 15(4), 577–590 (2016)

    Google Scholar 

  12. Cai, Z., Zheng, X.: A private and efficient mechanism for data uploading in smart cyber-physical systems. IEEE Trans. Netw. Sci. Eng. 7(2), 766–775 (2018)

    Article  MathSciNet  Google Scholar 

  13. Ye, D., Zhu, T., Shen, S., Zhou, W.: A differentially private game theoretic approach for deceiving cyber adversaries. IEEE Trans. Inf. Forensics Secur. 16, 569–584 (2020)

    Article  Google Scholar 

Download references

Acknowledgements

This research is supported by the National Natural Science Foundation of China (NSFC) under Grant No. 62172377 and 61872205, and the Natural Science Foundation of Shandong Province under Grant No. ZR2019MF018.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Xia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, N., Feng, Xc., Zhang, R., Yang, Xg., Xia, H. (2022). Network Defense Resource Allocation Scheme with Multi-armed Bandits. In: Wang, L., Segal, M., Chen, J., Qiu, T. (eds) Wireless Algorithms, Systems, and Applications. WASA 2022. Lecture Notes in Computer Science, vol 13471. Springer, Cham. https://doi.org/10.1007/978-3-031-19208-1_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-19208-1_27

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-19207-4

  • Online ISBN: 978-3-031-19208-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics