A Receding-Horizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks

被引:0
|
作者
Qian, Zhentian [1 ,2 ]
Fu, Jie [1 ,2 ]
Zhu, Quanyan [3 ]
机构
[1] Worcester Polytech Inst, Robot Engn Program, Worcester, MA 01609 USA
[2] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
[3] NYU, Dept Elect & Comp Engn, New York, NY 10003 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ccta41146.2020.9206360
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the problem of assessing the effectiveness of a proactive defense-by-detection policy with a network-based moving target defense. We model the network system using a probabilistic attack graph-a graphical security model. Given a network system with a proactive defense strategy, an intelligent attacker needs to perform reconnaissance repeatedly to learn about the locations of intrusion detection systems and re-plan optimally to reach the target while avoiding detection. To compute the attacker's strategy for security evaluation, we develop a receding-horizon planning algorithm using a risk-sensitive Markov decision process with a time-varying reward function. Finally, we implement both defense and attack strategies in a synthetic network and analyze how the frequency of network randomization and the number of detection systems can influence the success rate of the attacker. This study provides insights for designing proactive defense strategies against online and multi-stage attacks by a resourceful attacker.
引用
收藏
页码:977 / 983
页数:7
相关论文
共 50 条
  • [31] A Survey on Moving Target Defense for Networks: A Practical View
    Jalowski, Lukasz
    Zmuda, Marek
    Rawski, Mariusz
    ELECTRONICS, 2022, 11 (18)
  • [32] Energy Storage Operation for Voltage Control in Distribution Networks: A Receding Horizon Approach
    Zarrilli, Donato
    Giannitrapani, Antonio
    Paoletti, Simone
    Vicino, Antonio
    IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2018, 26 (02) : 599 - 609
  • [33] Combating the Bandits in the Cloud: A Moving Target Defense Approach
    Penner, Terry
    Guirguis, Mina
    2017 17TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND GRID COMPUTING (CCGRID), 2017, : 411 - 420
  • [34] A Novel Route Randomization Approach for Moving Target Defense
    Wang, Shaolei
    Zhou, Ying
    Guo, Ronghua
    Du, Jing
    Du, Jiawei
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 11 - 15
  • [35] A Moving Target Defense Approach to Disrupting Stealthy Botnets
    Venkatesan, Sridhar
    Albanese, Massimiliano
    Cybenko, George
    Jajodia, Sushil
    MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE, 2016, : 37 - 46
  • [36] On Evolutionary Computation for Moving Target Defense in Software Defined Networks
    Makanju, Adetokunbo
    Zincir-Heywood, A. Nur
    Kiyomoto, Shinsaku
    PROCEEDINGS OF THE 2017 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE COMPANION (GECCO'17 COMPANION), 2017, : 287 - 288
  • [38] Receding Horizon Estimation for Multi-Target Tracking via Random Finite Set Approach
    Kim, Du Yong
    2018 21ST INTERNATIONAL CONFERENCE ON INFORMATION FUSION (FUSION), 2018, : 1438 - 1444
  • [39] Performance and Security Evaluation of a Moving Target Defense Based on a Software-Defined Networking Environment
    Kim, Minjune
    Cho, Jin-Hee
    Lim, Hyuk
    Moore, Terrence J.
    Nelson, Frederica F.
    Kim, Dan Dongseong
    2022 IEEE 27TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2022, : 119 - 129
  • [40] Ransomware prevention using moving target defense based approach
    Khan, Muhammad Mubashir
    Hyder, Muhammad Faraz
    Khan, Shariq Mahmood
    Arshad, Junaid
    Khan, Muhammad M.
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2023, 35 (07):