Research Article

A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing

Table 1

The list of symbols' meanings.

SymbolNotation

Attacker’s strategy: intrusion frequency for each fog node at time , and it is the control variable of the attackers
Defender’s strategy: forbidding rate for system access at time , and it is the control variable of the IDS
System memory resource occupancy
The incomes of the attacker: expectation of invasion success
The incomes of the defender: access amount of legal users
The gains of the attacker
The gains of the defender
Total access amount of system at
Forbidding factor
System capacity: is enabled when the total access amount exceeds
Proportion of legal users in