A Receding-Horizon MDP Approach for Performance Evaluation of Moving Target Defense in Networks

被引:0
|
作者
Qian, Zhentian [1 ,2 ]
Fu, Jie [1 ,2 ]
Zhu, Quanyan [3 ]
机构
[1] Worcester Polytech Inst, Robot Engn Program, Worcester, MA 01609 USA
[2] Worcester Polytech Inst, Dept Elect & Comp Engn, Worcester, MA 01609 USA
[3] NYU, Dept Elect & Comp Engn, New York, NY 10003 USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/ccta41146.2020.9206360
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the problem of assessing the effectiveness of a proactive defense-by-detection policy with a network-based moving target defense. We model the network system using a probabilistic attack graph-a graphical security model. Given a network system with a proactive defense strategy, an intelligent attacker needs to perform reconnaissance repeatedly to learn about the locations of intrusion detection systems and re-plan optimally to reach the target while avoiding detection. To compute the attacker's strategy for security evaluation, we develop a receding-horizon planning algorithm using a risk-sensitive Markov decision process with a time-varying reward function. Finally, we implement both defense and attack strategies in a synthetic network and analyze how the frequency of network randomization and the number of detection systems can influence the success rate of the attacker. This study provides insights for designing proactive defense strategies against online and multi-stage attacks by a resourceful attacker.
引用
收藏
页码:977 / 983
页数:7
相关论文
共 50 条
  • [41] MoFaaS: A Moving Target Defense Approach to Fortify Functions as a Service
    Escaleira, Pedro
    Cunha, Vitor A.
    Barraca, Joao P.
    Gomes, Diogo
    Aguiar, Rui L.
    2024 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, ISCC 2024, 2024,
  • [42] A Cooperative Approach to Multiple UAVs Searching for Moving Targets Based on a Hybrid of Virtual Force and Receding Horizon
    Xiao, Xiao
    Dong, Zhuoning
    Wu, Jiang
    Duan, Haibin
    2012 10TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2012, : 1228 - 1233
  • [43] A Stealth Migration Approach to Moving Target Defense in Cloud Computing
    Das, Saikat
    Mahfouz, Ahmed M.
    Shiva, Sajjan
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 1, 2020, 1069 : 394 - 410
  • [44] A Symmetric Address Translation Approach for a Network Layer Moving Target Defense to Secure Power Grid Networks
    Ulrich, Jacob
    Drahos, Jacob
    Govindarasu, Manimaran
    2017 RESILIENCE WEEK (RWS), 2017, : 163 - 169
  • [45] Security Modeling and Analysis of Moving Target Defense in Software Defined Networks
    Mendonca, Julio
    Kim, Minjune
    Graczyk, Rafal
    Volp, Marcus
    Kim, Dan Dongseong
    2022 IEEE 27TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2022, : 141 - 151
  • [46] Mobile Robot Networks for Environmental Monitoring: A Cooperative Receding Horizon Temporal Logic Control Approach
    Lu Q.
    Han Q.-L.
    IEEE Transactions on Cybernetics, 2019, 49 (02): : 698 - 711
  • [47] Mobile Robot Networks for Environmental Monitoring: A Cooperative Receding Horizon Temporal Logic Control Approach
    Lu, Qiang
    Han, Qing-Long
    IEEE TRANSACTIONS ON CYBERNETICS, 2019, 49 (02) : 698 - 711
  • [48] Event-Based Moving Target Defense in Cloud Computing With VM Migration: A Performance Modeling Approach
    Santos, Lucas
    Brito, Carlos
    Fe, Iure
    Carvalho, Juliana
    Torquato, Matheus
    Choi, Eunmi
    Min, Dugki
    Lee, Jae-Woo
    Nguyen, Tuan Anh
    Silva, Francisco Airton
    IEEE ACCESS, 2024, 12 : 165539 - 165554
  • [49] Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in SDN networks
    Ribeiro, Marcos Aurelio
    Fonseca, Mauro Sergio Pereira
    de Santi, Juliana
    COMPUTERS & SECURITY, 2023, 134
  • [50] Dynamic Generation Containment Systems (DGCS): A Moving Target Defense Approach
    Chin, Tommy
    Xiong, Kaiqi
    2016 3RD INTERNATIONAL WORKSHOP ON EMERGING IDEAS AND TRENDS IN ENGINEERING OF CYBER-PHYSICAL SYSTEMS (EITEC), 2016, : 11 - 16