Evaluation of mimic defense strategy based on M-FlipIt game model

被引:0
|
作者
Ding S. [1 ]
Qi N. [1 ]
Guo Y. [2 ]
机构
[1] Institute of Information Technology, Information Engineering University, Zhengzhou
[2] Research and Development Department of Henan Xinda Wangyu Technology Co., Ltd., Zhengzhou
来源
| 1600年 / Editorial Board of Journal on Communications卷 / 41期
基金
中国国家自然科学基金;
关键词
Advanced persistent threat; Cyberspace mimic defense; Game model; Simulation analysis;
D O I
10.11959/j.issn.1000-436x.2020136
中图分类号
学科分类号
摘要
To make up for the lack of security performance evaluation of the mimic defense systems in the advanced persistent threat scenarios an improved game model based on the FlipIt game theory model was proposed. The dynamic strategy of mimic defense under different heterogeneity conditions was evaluated, and a case study for the simulation analysis was conducted. The simulation results show that the rotation of indefinite period can make up for the lack of heterogeneity and maintain the higher game payoff of defenders. © 2020, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:186 / 194
页数:8
相关论文
共 20 条
  • [1] Trustworthy cyberspace: strategic plan for the federal cybersecurity research and development program
  • [2] COX B, EVANS D, FILIPI A, Et al., N-variant systems: a secretless framework for security through diversity, Conference on USENIX Security Symposium, pp. 1-16, (2006)
  • [3] HOFMEYR S A, FORREST S., Architecture for an artificial immune system, Evolutionary Computation, 8, 4, pp. 443-473, (2000)
  • [4] KAMPANAKIS P, PERROS H, BEYENE T., SDN-based solutions for moving target defense network protection, The 2014 IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks, pp. 1-6, (2014)
  • [5] WU J X., Research on cyber mimic defense, Journal of Cyber Security, 1, 4, pp. 1-10, (2016)
  • [6] REN Q, WU J X, HEI L., Research on mimic DNS archi-tectural strategy based on generalized stochastic petri net, Journal of Cyber Security, 4, 2, pp. 37-52, (2019)
  • [7] HU H C, CHEN F C, WANG Z P., Perfor-mance evaluations on DHR for cyberspace mimic defense, Journal of Cyber Security, 1, 4, pp. 40-51, (2016)
  • [8] ZHANG J X, PANG J M, ZHANG Z., Quantification method for heterogeneity on Web server with mimic construction, Journal of Software, 31, 2, pp. 564-577, (2020)
  • [9] ZHANG J X, PANG J M, ZHANG Z, Et al., QoS quantification method for Web server with mimic construction, Computer Science, 46, 11, pp. 109-118, (2019)
  • [10] ZHANG J X, PANG J M, ZHANG Z, Et al., Executors scheduling algorithm for Web server with mimic structure, Computer Engineering, 45, 8, pp. 14-21, (2019)