Research Article
A Novel Differential Game Model-Based Intrusion Response Strategy in Fog Computing
Table 1
The list of symbols' meanings.
| Symbol | Notation |
| | Attacker’s strategy: intrusion frequency for each fog node at time , and it is the control variable of the attackers | | Defender’s strategy: forbidding rate for system access at time , and it is the control variable of the IDS | | System memory resource occupancy | | The incomes of the attacker: expectation of invasion success | | The incomes of the defender: access amount of legal users | | The gains of the attacker | | The gains of the defender | | Total access amount of system at | | Forbidding factor | | System capacity: is enabled when the total access amount exceeds | | Proportion of legal users in |
|
|