A Bayesian Q-Learning Game for Dependable Task Offloading Against DDoS Attacks in Sensor Edge Cloud

[1]  Hongbo Zhu,et al.  Deceptive Attack and Defense Game in Honeypot-Enabled Networks for the Internet of Things , 2016, IEEE Internet of Things Journal.

[2]  Vijay Varadharajan,et al.  Counteracting security attacks in virtual machines in the cloud using property based attestation , 2014, J. Netw. Comput. Appl..

[3]  S. Mercy Shalinie,et al.  Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture , 2020, IEEE Internet of Things Journal.

[4]  Qun Li,et al.  A Survey of Virtual Machine Management in Edge Computing , 2019, Proceedings of the IEEE.

[5]  Shui Yu,et al.  Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks , 2018, IEEE Internet of Things Journal.

[6]  Xiangjian He,et al.  A Novel Collaborative Task Offloading Scheme for Secure and Sustainable Mobile Cloudlet Networks , 2018, IEEE Access.

[7]  Pramod K. Varshney,et al.  Strategic Power Allocation With Incomplete Information in the Presence of a Jammer , 2016, IEEE Transactions on Communications.

[8]  Qinghe Du,et al.  Deep Learning-Based DDoS-Attack Detection for Cyber–Physical System Over 5G Network , 2021, IEEE Transactions on Industrial Informatics.

[9]  Yunlong Cai,et al.  Latency Optimization for Resource Allocation in Mobile-Edge Computation Offloading , 2017, IEEE Transactions on Wireless Communications.

[10]  Athanasios V. Vasilakos,et al.  Differential Game-Based Strategies for Preventing Malware Propagation in Wireless Sensor Networks , 2014, IEEE Transactions on Information Forensics and Security.

[11]  Katinka Wolter,et al.  A secure and cost-efficient offloading policy for Mobile Cloud Computing against timing attacks , 2018, Pervasive Mob. Comput..

[12]  J. Harsanyi Games with Incomplete Information Played by “Bayesian” Players Part II. Bayesian Equilibrium Points , 1968 .

[13]  Anthony T. Chronopoulos,et al.  Game-theoretic static load balancing for distributed systems , 2011, J. Parallel Distributed Comput..

[14]  Jianhua Liu,et al.  Energy-Efficient Two-Layer Cooperative Defense Scheme to Secure Sensor-Clouds , 2018, IEEE Transactions on Information Forensics and Security.

[15]  Yoav Shoham,et al.  Multiagent Systems - Algorithmic, Game-Theoretic, and Logical Foundations , 2009 .

[16]  Zheng Chang,et al.  Adaptive Service Offloading for Revenue Maximization in Mobile Edge Computing With Delay-Constraint , 2019, IEEE Internet of Things Journal.

[17]  Michael Mitzenmacher,et al.  The Power of Two Choices in Randomized Load Balancing , 2001, IEEE Trans. Parallel Distributed Syst..

[18]  Neha Agrawal,et al.  Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges , 2019, IEEE Communications Surveys & Tutorials.

[19]  Feng Wu,et al.  A Secure, Efficient, and Accountable Edge-Based Access Control Framework for Information Centric Networks , 2019, IEEE/ACM Transactions on Networking.

[20]  Mohammadreza Soltanaghaei,et al.  A Novel Distributed Denial of Service (DDoS) Detection Method in Software Defined Networks , 2020 .

[21]  Arwa Alrawais,et al.  FlowGuard: An Intelligent Edge Defense Mechanism Against IoT DDoS Attacks , 2020, IEEE Internet of Things Journal.

[22]  Muttukrishnan Rajarajan,et al.  Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks , 2018, IEEE Transactions on Dependable and Secure Computing.

[23]  Tetsutaro Uehara,et al.  Fog Computing: Issues and Challenges in Security and Forensics , 2015, 2015 IEEE 39th Annual Computer Software and Applications Conference.

[24]  Thomas Bauschert,et al.  Q-MIND: Defeating Stealthy DoS Attacks in SDN with a Machine-Learning Based Defense Framework , 2019, 2019 IEEE Global Communications Conference (GLOBECOM).

[25]  H. Vincent Poor,et al.  Mobile offloading game against smart attacks , 2016, 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[26]  Abdullah Konak,et al.  A Game-Theoretic Genetic Algorithm for the reliable server assignment problem under attacks , 2015, Comput. Ind. Eng..

[27]  Mahesan Niranjan,et al.  On-line Q-learning using connectionist systems , 1994 .

[28]  James Gross,et al.  Statistical guarantee optimization for age of information for the D/G/1 queue , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[29]  Peng Ning,et al.  Dynamic IDS Configuration in the Presence of Intruder Type Uncertainty , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[30]  Dan Liu,et al.  A Survey on Secure Data Analytics in Edge Computing , 2019, IEEE Internet of Things Journal.

[31]  Weizhe Zhang,et al.  Resource allocation and computation offloading with data security for mobile edge computing , 2019, Future Gener. Comput. Syst..

[32]  Xiang Chen,et al.  Security in Mobile Edge Caching with Reinforcement Learning , 2018, IEEE Wireless Communications.

[33]  Xin Liu,et al.  Adaptive Learning-Based Task Offloading for Vehicular Edge Computing Systems , 2019, IEEE Transactions on Vehicular Technology.

[34]  Hongjie Li,et al.  A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud , 2015, Appl. Soft Comput..

[35]  Liang Xiao,et al.  Cloud-Based Malware Detection Game for Mobile Devices with Offloading , 2017, IEEE Transactions on Mobile Computing.

[36]  Yasir Faheem,et al.  A Bayesian Game-Theoretic Intrusion Detection System for Hypervisor-Based Software Defined Networks in Smart Grids , 2019, IEEE Access.

[37]  Kun Wang,et al.  An SDN-Enabled Pseudo-Honeypot Strategy for Distributed Denial of Service Attacks in Industrial Internet of Things , 2020, IEEE Transactions on Industrial Informatics.

[38]  Sabu M. Thampi,et al.  Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things , 2019, Pervasive Mob. Comput..

[39]  Ren-Hung Hwang,et al.  MECPASS: Distributed Denial of Service Defense Architecture for Mobile Networks , 2018, IEEE Network.

[40]  Yung-Liang Lai Analyzing strategies of mobile agents on malicious cloud platform with Agent-Based Computational Economic Approach , 2013, Expert Syst. Appl..

[41]  Manoj Singh Gaur,et al.  DDoS attacks in cloud computing: Issues, taxonomy, and future directions , 2015, Comput. Commun..

[42]  Sheng Zhong,et al.  A Unified Resource Allocation Framework for Defending Against Pollution Attacks in Wireless Network Coding Systems , 2016, IEEE Transactions on Information Forensics and Security.

[43]  Dimitrios P. Pezaros,et al.  Per-Host DDoS Mitigation by Direct-Control Reinforcement Learning , 2020, IEEE Transactions on Network and Service Management.

[44]  F. Richard Yu,et al.  A Multi-Level DDoS Mitigation Framework for the Industrial Internet of Things , 2018, IEEE Communications Magazine.

[45]  Yanjiao Chen,et al.  Survive and Thrive: A Stochastic Game for DDoS Attacks in Bitcoin Mining Pools , 2020, IEEE/ACM Transactions on Networking.

[46]  Setareh Maghsudi,et al.  Computation Offloading and Activation of Mobile Edge Computing Servers: A Minority Game , 2017, IEEE Wireless Communications Letters.

[47]  Shashank Gupta,et al.  SFC: A Three Layer Smart Phone-Fag-Cloud Framework for Defending Against JavaScript Code Injection Vulnerabilities on OSN , 2018, 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).

[48]  Yueming Cai,et al.  Dynamic Computation Offloading for Mobile Cloud Computing: A Stochastic Game-Theoretic Approach , 2019, IEEE Transactions on Mobile Computing.

[49]  Xuemin Shen,et al.  Securing Fog Computing for Internet of Things Applications: Challenges and Solutions , 2018, IEEE Communications Surveys & Tutorials.

[50]  Zhi Zhou,et al.  Efficient Resource Allocation for On-Demand Mobile-Edge Cloud Computing , 2018, IEEE Transactions on Vehicular Technology.