NPM: An Anti-attacking Analysis Model of the MTD system Based on Martingale Theory

被引:0
|
作者
Yang, Xin [1 ]
Li, Hui [1 ]
Wang, Han [1 ]
机构
[1] Peking Univ, Huawei & PKU Jointly Engn Lab Future Network Base, Shenzhen Engn Lab Converged Networking Technol,PK, Future Network PKU Lab Natl Major Res Infrastruct, Shenzhen 518055, Peoples R China
来源
2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC) | 2018年
关键词
Moving Target Defense; Security Analysis; Martingales; Markov Chains; Dynamic Heterogenous Network; N-version programming;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Moving target defense (MTD) techniques are effective solutions to improve the network security by continuously reconfiguring the system setting. On the other hand, continuously transforming also increase the cost of defenders, so it is important to analyze the effectiveness of MTDs compared with their cost. Current researches lack of analyzing the effectiveness by mathematical theory compared with analyzing by experiment. Motivated by the above, we propose a novel three-dimension model named NPM jointly use N-version programming, Poisson process, Markov chain and martingale theory to analyze the effectiveness of the proposed MTD model. Our analysis points out the difficulty for a successful adversary to defeat the MTD system, which is related to the system configuration, such as the number of executors and the judgment criterion in every node, the transforming period and rang of system MTD transformation. Finally, we give advices on the design of the system in the daily defense and the attacked defense, with the goal of guaranteeing security with minimal cost.
引用
收藏
页码:571 / 577
页数:7
相关论文
共 50 条
  • [21] A Data Mining Model of Complex System Based on Improved Cluster Analysis Model and Rough Set Theory
    Cai, Yuanyuan
    Qi, Liangqun
    Wang, Chengdong
    INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2013, 43 (13): : 45 - 51
  • [22] A data mining model of complex system based on improved cluster analysis model and rough set theory
    Cai, Yuanyuan
    Qi, Liangqun
    Wang, Chengdong
    International Journal of Applied Mathematics and Statistics, 2013, 43 (13): : 45 - 51
  • [23] A system theory (STAMP) based quantitative accident analysis model for complex engineering systems
    Ceylan, Bulut Ozan
    Karatug, Caglar
    Akyuz, Emre
    Arslanoglu, Yasin
    Boustras, Georgios
    SAFETY SCIENCE, 2023, 166
  • [24] A Model for Structural Vulnerability Analysis of Shipboard Power System Based on Complex Network Theory
    Huang Jing
    Ji Xin
    He Huiying
    2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 100 - 104
  • [25] Milo: Attacking Deep Pre-trained Model for Programming Languages Tasks with Anti-analysis Code Obfuscation
    Song, Leo
    Ding, Steven H.H.
    Proceedings - International Computer Software and Applications Conference, 2023, 2023-June : 586 - 594
  • [26] Milo: Attacking Deep Pre-trained Model for Programming Languages Tasks with Anti-analysis Code Obfuscation
    Song, Leo
    Ding, Steven H. H.
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 586 - 594
  • [27] Drawback Analysis on the In-kind Subsidy Model of Affordable Housing System - Based on the Analysis of Game Theory
    Li Ying
    Dong Fan
    Yang Shizai
    URBANIZATION AND LAND RESERVATION RESEARCH, 2009, : 380 - +
  • [28] Risk Analysis Model Based on Prototype Theory
    Guo, Ling
    2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 1, 2012, : 22 - 25
  • [29] Digraph Theory Based System Testability Analysis
    Wang Baolong
    Huang Kaoli
    Ma Liyuan
    Xu Jianfen
    PROCEEDINGS OF THE THIRD INTERNATIONAL SYMPOSIUM ON TEST AUTOMATION & INSTRUMENTATION, VOLS 1 - 4, 2010, : 209 - 212
  • [30] A CONTROL THEORY BASED ANALYSIS OF REPAIRABLE SYSTEM
    Bhat, Suhas
    Munoli, S. B.
    Gani, S. R.
    INTERNATIONAL JOURNAL OF AGRICULTURAL AND STATISTICAL SCIENCES, 2021, 17 : 957 - 965