An Efficient Multiplex Network Model for Effective Honeypot Roaming Against DDoS Attacks

被引:1
|
作者
Ren, Jianguo [1 ,2 ]
Zhi, Qiang [1 ]
机构
[1] Jiangsu Normal Univ, Coll Comp Sci, Xuzhou 221116, Peoples R China
[2] Jiangsu Normal Univ, Res Ctr Complex Networks & Swarm Intelligence, Xuzhou 221116, Peoples R China
基金
美国国家科学基金会;
关键词
Denial-of-service attack; Roaming; Servers; Network topology; Optimization; Numerical models; Dynamic scheduling; Honeypot roaming; multiplex network; roaming frequency; network security; SERVICE; INTERNET; PROPAGATION; DYNAMICS; DEFENSE;
D O I
10.1109/TNSE.2023.3333230
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Honeypot roaming represents an effective mechanism against distributed denial of service (DDoS) attacks at the cost of system resources. Currently, the roaming frequency is set randomly, which brings the question of how often honeypots need to roam to minimize the attack impacts while preserving limited system resources. To address this challenge, this paper proposes an effective Multiplex Network Model, called MNM. First, an innovative multiplex network model composed of a normal node layer and a honeypot node layer is constructed, providing a probabilistic description of dynamical functional interaction and achieving the state transition between the two layers. Then, a condition is defined to determine whether nodes can be continuously infected during the DDoS attacks. More importantly, an optimal roaming frequency is theoretically determined using optimization theory to optimize the related parameters. A series of experimental verifications was made in three different two-layer network topologies, and the results indicate that our proposals are effective in reducing attack impacts and lowering resource consumption compared to a series of random roaming frequencies. This study can provide significant guidance for roaming honeypot design.
引用
收藏
页码:1909 / 1921
页数:13
相关论文
共 50 条
  • [41] Safeguarding IoT networks against DDoS attacks using deep learning based zero trust network access
    Khan, Murad
    ELECTRONICS LETTERS, 2024, 60 (21)
  • [42] A novel model for securing mobile-based systems against DDoS attacks in cloud computing environment
    El-Sofany H.F.
    El-Seoud S.A.
    International Journal of Interactive Mobile Technologies, 2019, 13 (01) : 85 - 98
  • [43] GridSec: Trusted grid computing with security binding and self-defense against network worms and DDoS attacks
    Hwang, K
    Kwok, YK
    Song, SS
    Chen, MCY
    Chen, Y
    Zhou, R
    Lou, XS
    COMPUTATIONAL SCIENCE - ICCS 2005, PT 3, 2005, 3516 : 187 - 195
  • [44] An Energy-Efficient Topology Design and DDoS Attacks Mitigation for Green Software-Defined Satellite Network
    Tu, Zhe
    Zhou, Huachun
    Li, Kun
    Li, Man
    Tian, Aleteng
    IEEE ACCESS, 2020, 8 : 211434 - 211450
  • [45] Honeypot game-theoretical model for defending against APT attacks with limited resources in cyber-physical systems
    Tian, Wen
    Ji, Xiao-Peng
    Liu, Weiwei
    Zhai, Jiangtao
    Liu, Guangjie
    Dai, Yuewei
    Huang, Shuhua
    ETRI JOURNAL, 2019, 41 (05) : 585 - 598
  • [46] An Effective Network Repair Strategy Against Both Random and Malicious Edge Attacks
    Zhao, Jianda
    Sun, Shiwen
    Shen, Hao
    Xia, Chengyi
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 8628 - 8633
  • [47] An Efficient Edge-Based Authentication for Network Coding Against Entropy Attacks
    Iguchi, Ryo
    Manabe, Yoshifumi
    2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2014, : 133 - 139
  • [48] An Efficient Blurring-Reconstruction Model to Defend Against Adversarial Attacks
    Zhou, Wen
    Wang, Liming
    Zheng, Yaohao
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2020, PT I, 2020, 12396 : 491 - 503
  • [49] Deep Neural Network Quantization Framework for Effective Defense against Membership Inference Attacks
    Famili, Azadeh
    Lao, Yingjie
    SENSORS, 2023, 23 (18)
  • [50] An Effective Blockchain-Based Defense Model for Organizations against Vishing Attacks
    Fakieh, Ahlam
    Akremi, Aymen
    APPLIED SCIENCES-BASEL, 2022, 12 (24):