5 research outputs found

    Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks

    Full text link
    © 2018 IEEE. We consider the Internet of Things (IoT) with malware diffusion and seek optimal malware detection strategies for preserving the privacy of smart objects in IoT networks and suppressing malware diffusion. To this end, we propose a malware detection infrastructure realized by an intrusion detection system (IDS) with cloud and fog computing to overcome the IDS deployment problem in smart objects due to their limited resources and heterogeneous subnetworks. We then employ a signaling game to disclose interactions between smart objects and the corresponding fog node because of malware uncertainty in smart objects. To minimize privacy leakage of smart objects, we also develop optimal strategies that maximize malware detection probability by theoretically computing the perfect Bayesian equilibrium of the game. Moreover, we analyze the factors influencing the optimal probability of a malicious smart object diffusing malware, and factors influencing the performance of a fog node in determining an infected smart object. Finally, we present a framework to demonstrate a potential and practical application of suppressing malware diffusion in IoT networks

    Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks

    No full text

    Leadership Strategies to Reduce Cyberattacks During a Merger

    Get PDF
    The difficulty that leaders in the wine industry have in rapidly responding to cyber threats to secure sensitive information and intellectual property while undertaking a merger can have a direct economic cost and disrupt the merger. Grounded in Habermas’s systems theory, the purpose of this single case study was to examine strategies used to mitigate the risk from cyberattacks during a merger. The participants were five business leaders in a wine company in Northern California. Data were collected using semistructured interviews, company documentation, and publicly available documents. Through thematic analysis, four themes were identified: protection of data integrity, formal and informal communication/feedback methods, training, and establishing cybersecurity frameworks to increase security. A key recommendation is for business leaders to fully understand where data reside and who is managing data to ensure that cybersecurity control measures are working. Implications for positive social change include the potential for business leaders to build prevention strategies that can lower the risk of a data breach during a merger to provide better safeguards to protect the privacy of customers’ information and preserve companies’ sensitive information and intellectual property. These change initiatives can positively impact customer satisfaction and help promote job growth within the community
    corecore