An Efficient Multiplex Network Model for Effective Honeypot Roaming Against DDoS Attacks

被引:1
|
作者
Ren, Jianguo [1 ,2 ]
Zhi, Qiang [1 ]
机构
[1] Jiangsu Normal Univ, Coll Comp Sci, Xuzhou 221116, Peoples R China
[2] Jiangsu Normal Univ, Res Ctr Complex Networks & Swarm Intelligence, Xuzhou 221116, Peoples R China
基金
美国国家科学基金会;
关键词
Denial-of-service attack; Roaming; Servers; Network topology; Optimization; Numerical models; Dynamic scheduling; Honeypot roaming; multiplex network; roaming frequency; network security; SERVICE; INTERNET; PROPAGATION; DYNAMICS; DEFENSE;
D O I
10.1109/TNSE.2023.3333230
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Honeypot roaming represents an effective mechanism against distributed denial of service (DDoS) attacks at the cost of system resources. Currently, the roaming frequency is set randomly, which brings the question of how often honeypots need to roam to minimize the attack impacts while preserving limited system resources. To address this challenge, this paper proposes an effective Multiplex Network Model, called MNM. First, an innovative multiplex network model composed of a normal node layer and a honeypot node layer is constructed, providing a probabilistic description of dynamical functional interaction and achieving the state transition between the two layers. Then, a condition is defined to determine whether nodes can be continuously infected during the DDoS attacks. More importantly, an optimal roaming frequency is theoretically determined using optimization theory to optimize the related parameters. A series of experimental verifications was made in three different two-layer network topologies, and the results indicate that our proposals are effective in reducing attack impacts and lowering resource consumption compared to a series of random roaming frequencies. This study can provide significant guidance for roaming honeypot design.
引用
收藏
页码:1909 / 1921
页数:13
相关论文
共 50 条
  • [1] Research on An Effective Approach against DDoS Attacks
    Zeng Xiao-hui
    Peng Xuan-ge
    Li Man-hua
    Xu Hong-qi
    Jin Shi-yao
    2009 INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN COMPUTER SCIENCE, ICRCCS 2009, 2009, : 21 - +
  • [2] A path identification mechanism for effective filtering against DDoS attacks
    Ahn, Y
    Wee, K
    Hong, M
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 325 - 330
  • [3] MSOM: Efficient Mechanism for Defense against DDoS Attacks in VANET
    Al-Mehdhara, Mohammed
    Ruan, Na
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [4] Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model
    Qi, Chunyang
    Huang, Jie
    Huang, Cheng
    Wu, Huaqing
    Shen, Xuemin
    2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022), 2022, : 6259 - 6264
  • [5] Intrusion Detection System Model Implementation against DDOS attacks
    Nenova, Maria
    Atanasov, Denis
    Kassev, Kiril
    Nenov, Andon
    2019 IEEE INTERNATIONAL CONFERENCE ON MICROWAVES, ANTENNAS, COMMUNICATIONS AND ELECTRONIC SYSTEMS (COMCAS), 2019,
  • [6] A hybrid model against TCP SYN and reflection DDoS attacks
    Tupakula, Udaya Kiran
    Varadharajan, Vijay
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (03): : 153 - 166
  • [7] A collaborative defense mechanism against DDoS attacks for network service continuity
    Park, PyungKoo
    Yoo, Seongmin
    Ryu, Hoyong
    Park, Jaehyung
    Chung, Kyung-Ho
    Ryou, Jaecheol
    ASIA LIFE SCIENCES, 2015, : 93 - 107
  • [8] Early Detection of DDoS Attacks Against Software Defined Network Controllers
    Mousavi, Seyed Mohammad
    St-Hilaire, Marc
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2018, 26 (03) : 573 - 591
  • [9] Chaos Theory Based Detection against Network Mimicking DDoS Attacks
    Chonka, Ashley
    Singh, Jaipal
    Zhou, Wanlei
    IEEE COMMUNICATIONS LETTERS, 2009, 13 (09) : 717 - 719
  • [10] Early Detection of DDoS Attacks Against Software Defined Network Controllers
    Seyed Mohammad Mousavi
    Marc St-Hilaire
    Journal of Network and Systems Management, 2018, 26 : 573 - 591