2019
DOI: 10.1109/access.2019.2918319
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks

Abstract: In a real network environment, multiple types of attacks can occur. The more important the service or network, the more attacks it may suffer simultaneously. Moving target defense (MTD) technology is a revolutionary game-changing cyberspace technology that has found various applications in recent years. However, the existing strategies are targeted at defending against specific types of attacks and do not meet the security requirements for multiple attacks. Therefore, we propose a joint defense strategy based … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(9 citation statements)
references
References 48 publications
0
9
0
Order By: Relevance
“…Each column j represents a timestamp, and at each time j, the defender can pick max(5, u j ) paths to monitor where u j is the number of undetermined paths at time j. For a position (i, j) where i ∈ [1,20] and j ∈ [1, 80], if it is in blue, it means path i is monitored at timestamp j; if it is in red, it means path i is classified as an APT attack scenario at timestamp j and it will no longer be monitored which is represented by marking its future states as grey; if it is in green, it means path i is classified as a benign scenario at timestamp j and it will no longer be monitored which is represented by marking its future states as grey. Therefore, the number of undetermined paths u j is the number of paths that are not in grey at time j.…”
Section: Results and Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Each column j represents a timestamp, and at each time j, the defender can pick max(5, u j ) paths to monitor where u j is the number of undetermined paths at time j. For a position (i, j) where i ∈ [1,20] and j ∈ [1, 80], if it is in blue, it means path i is monitored at timestamp j; if it is in red, it means path i is classified as an APT attack scenario at timestamp j and it will no longer be monitored which is represented by marking its future states as grey; if it is in green, it means path i is classified as a benign scenario at timestamp j and it will no longer be monitored which is represented by marking its future states as grey. Therefore, the number of undetermined paths u j is the number of paths that are not in grey at time j.…”
Section: Results and Analysismentioning
confidence: 99%
“…Multiple malicious activities can happen simultaneously on a host or system, especially when it performs missioncritical tasks [1]. If the monitoring capacity (also referred to as monitoring resources throughout this paper) is limited, without thoughtful allocation of these resources, it is possible that some malicious activities will not be captured and identified.…”
Section: Introductionmentioning
confidence: 99%
“…Du et al [19] used the evolutionary game theory framework of community to analyze the privacy protection behavior of the social network and designed incentives based on cost performance. Based on the analytic hierarchy process, Zhang et al [20] comprehensively analyzed the impact of mobile target defense technology, proposed an effective strategy selection algorithm based on joint defense, and selected many variation elements to defend different attack.…”
Section: Evolutionary Game Approachmentioning
confidence: 99%
“…Hong et al [20] also incorporated MTD techniques into a temporal graph-based graphical security model and developed a new set of dynamic security metrics to assess and compare their effectiveness. Moreover, an evaluation model of MTD effectiveness based on system attack surface (SAS) was proposed by Xiong et al [21], and Zhang et al [22] proposed an efficient strategy selection for MTD, where the analytic hierarchy process (AHP) was employed to quantify the factors affecting the attack and defense costs.…”
Section: Related Workmentioning
confidence: 99%