Effectiveness Evaluation of Moving Network Defense Based on Host Security State Transition Model

被引:2
|
作者
Liu J. [1 ,2 ]
Zhang H. [1 ,2 ]
Yang Y. [1 ,2 ]
Wang Y. [1 ,2 ]
机构
[1] PLA Information Engineering University, Zhengzhou
[2] Henan Key Laboratory of Information Security, Zhengzhou
来源
Liu, Jiang (liujiang2333@163.com) | 1600年 / Science Press卷 / 39期
关键词
Effectiveness evaluation; Host security state transition; Moving network defense; Transition probability;
D O I
10.11999/JEIT160513
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To evaluate the effectiveness of moving network defense, this paper presents the host security state deduce graph construction algorithm in moving network defense environment. The host security state transition model is constructed, the quantitative effectiveness evaluation method is proposed for moving network defense based on host state transition probability, and a useful reference is provided for the design of moving network defense policy. Finally, feasibility and effectiveness of the proposed model and method are illustrated and verified in a representative network example. © 2017, Science Press. All right reserved.
引用
收藏
页码:509 / 517
页数:8
相关论文
共 17 条
  • [1] Prakash A., Wellman M.P., Empirical game-theoretic analysis for moving target defense, Proceedings of the Second ACM Workshop on Moving Target Defense, pp. 57-65, (2015)
  • [2] Zhuang R., Bardas A.G., Deloach S.A., Et al., A theory of cyber attacks: a step towards analyzing MTD systems, Proceedings of the Second ACM Workshop on Moving Target Defense, pp. 11-20, (2015)
  • [3] Green M., Macfarland D.C., Smestad D.R., Et al., Characterizing network-based moving target defenses, Proceedings of the Second ACM Workshop on Moving Target Defense, pp. 31-35, (2015)
  • [4] Jafarian J.H., Al-Shaer E., Qi D., An effective address mutation approach for disrupting reconnaissance attacks, IEEE Transactions on Information Forensics and Security, 10, 12, pp. 2562-2577, (2015)
  • [5] Evans D., Nguyen-Tuong A., Knight J., Effectiveness of Moving Target Defenses, Moving Target Defense I: Creating Asymmetric Uncertainty for Cyber Threats, pp. 29-48, (2011)
  • [6] Manadhata P.K., Game Theoretic Approaches to Attack Surface Shifting, Moving Target Defense II: Application of Game Theory and Adversarial Modeling, pp. 1-13, (2013)
  • [7] Zhuang R., Zhang S., Deloach S.A., Et al., Simulation-based approaches to studying effectiveness of moving target network defense, National Symposium on Moving Target Research, pp. 21-26, (2012)
  • [8] Okhravi H., Riordan J., Carter K., Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism, pp. 405-425, (2014)
  • [9] Zhuang R., Deloach S.A., Ou X., A model for analyzing the effect of moving target defenses on enterprise networks, Procee dings of the 9th Annual Cyber and Information Security Research Conference, pp. 73-76, (2014)
  • [10] Han Y., Lu W., Xu S., Characterizing the power of moving target defense via cyber epidemic dynamics, Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, pp. 23-33, (2014)