2023
DOI: 10.1109/tdsc.2022.3232537
|View full text |Cite
|
Sign up to set email alerts
|

WF-MTD: Evolutionary Decision Method for Moving Target Defense Based on Wright-Fisher Process

Abstract: The limitations of the professional knowledge and cognitive capabilities of both attackers and defenders mean that moving target attack-defense conflicts are not completely rational, which makes it difficult to select optimal moving target defense strategies difficult for use in real-world attack-defense scenarios. Starting from the imperfect rationality of both attack-defense, we construct a Wright-Fisher process-based moving target defense strategy evolution model called WF-MTD. In our method, we introduce r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(9 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…Historically, to discover irregular energy usage, technicians must examine consumer monthly consumption data collected over an extended period, and after that, they must physically visit each resident community to confirm the condition and connection of each meter (Cheng et al, 2017;Zhang et al, 2023a). Due to research into machine learning (ML) techniques, power utilities now have a new opportunity to identify unusual electricity usage patterns from a variety of energy data (Zhang et al, 2023b;Tan et al, 2023). By identifying anomalous patterns, these techniques can reduce the workload for system operators and increase detection accuracy (Guarda et al, 2023).…”
Section: Introductionmentioning
confidence: 99%
“…Historically, to discover irregular energy usage, technicians must examine consumer monthly consumption data collected over an extended period, and after that, they must physically visit each resident community to confirm the condition and connection of each meter (Cheng et al, 2017;Zhang et al, 2023a). Due to research into machine learning (ML) techniques, power utilities now have a new opportunity to identify unusual electricity usage patterns from a variety of energy data (Zhang et al, 2023b;Tan et al, 2023). By identifying anomalous patterns, these techniques can reduce the workload for system operators and increase detection accuracy (Guarda et al, 2023).…”
Section: Introductionmentioning
confidence: 99%
“…In the realms of cybersecurity, cryptography and security analysis, an adversary model-often termed a threat model-is a conceptual framework designed to characterize and delineate potential attackers or threats that a system, protocol or application might face. This model assists in identifying and understanding the myriad strategies an adversary might employ to compromise a system's security [51][52][53].…”
Section: Adversary Modelmentioning
confidence: 99%
“…After obtaining the three indicators of degree centrality, intermediate centrality and proximity centrality of the node, we weight them to obtain the centrality weight u C of the node, as shown in formula (8), where the weights of the three indicators are determined by the network administrator according to the network topology. The weight of the path set Paths is initialized using the centrality weight u C of the node.…”
Section: Path Initial Weight Calculationmentioning
confidence: 99%
“…As can be seen from the figure, since the routing path in the static network will not change once it is generated, the shortest path between host1 and server20 is obtained according to the shortest path algorithm as (1-4-5-8-9). Therefore, the attacker can monitor all communication data between host1 and server20 on any of the switches (4,5,8). In contrast, the random routing network will distribute the communication data on all switch nodes, however, the randomly generated forwarding path will cause some important nodes (such as node 5) to appear repeatedly in multiple paths, so that the attacker in important nodes can obtain most of the communication data and may cause link congestion of important nodes.…”
Section: Validity Verificationmentioning
confidence: 99%