Research on mimic decision method based on deep learning

被引:0
|
作者
Yang X. [1 ]
Cheng G. [1 ,2 ]
Liu W. [1 ,2 ]
Zhang S. [1 ]
Hao B. [3 ]
机构
[1] Institute of Information Technology, Information Engineering University, Zhengzhou
[2] Key Laboratory of Cyberspace Security, Ministry of Education, Zhengzhou
[3] Songshan Laboratory, Zhengzhou
来源
关键词
active defense; deep learning; mimic decision; mimic defense; offline learning-online decision-making;
D O I
10.11959/j.issn.1000-436x.2024047
中图分类号
学科分类号
摘要
Due to software and hardware differentiation, the problem of false positives mistakenly identified as network attack behavior caused by inconsistent mimic decision results frequently occurs. Therefore, a mimic decision method based on deep learning was proposed. By constructing an unsupervised autoencoder-decoder deep learning model, the deep semantic features of diverse normal response data were explored from different executions and its statistical rules were analyzed and summarized. Additionally, the offline learning-online decision-making mechanism and the feedback optimization mechanism were designed to solve false positive problem, thereby accurately detecting network attacks and improving target system security resilience. Since statistical rules of normal response data was understood and mastered by deep learning model, the mimic decision results among different executions could remain consistent, indicating that the target system was in a secure state. However, once the target system was subjected to a network attacks, the response data outputted by the different executions was deviated from statistical distribution of deep learning model. Therefore, inconsistent mimic decision results were presented, indicating that the affected execution was under attack and the target system was exposed to potential security threats. The experiments show that the performance of the proposed method is significantly superior to the popular mimic decision methods, and the average prediction accuracy is improved by 14.89%, which is conducive to integrating the method into the mimic transformation of real application to enhance the system’s defensive capability. © 2024 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:79 / 89
页数:10
相关论文
共 25 条
  • [1] YANG A M, LU C M, LI J, Et al., Application of meta-learning in cyberspace security: a survey, Digital Communications and Networks, 9, 1, pp. 67-78, (2023)
  • [2] WU J X., Development paradigms of cyberspace endogenous safety and security, Science China Information Sciences, 65, 5, (2022)
  • [3] SEPCZUK M., Dynamic Web application firewall detection supported by cyber mimic defense approach, Journal of Network and Computer Applications, 213, (2023)
  • [4] MOLINA-CORONADO B, MORI U, MENDIBURU A, Et al., Survey of network intrusion detection methods from the perspective of the knowledge discovery in databases process, IEEE Transactions on Network and Service Management, 17, 4, pp. 2451-2479, (2020)
  • [5] ZHAO R J, GUI G, XUE Z, Et al., A novel intrusion detection method based on lightweight neural network for Internet of things, IEEE Internet of Things Journal, 9, 12, pp. 9960-9972, (2022)
  • [6] WU Y H, HU X D., Industrial Internet security protection based on an industrial firewall, Proceedings of the 2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), pp. 239-247, (2021)
  • [7] WU J X., Research on cyber mimic defense, Journal of Cyber Security, 1, 4, pp. 1-10, (2016)
  • [8] WU T, HU C N, CHEN Q N, Et al., Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition, Journal on Communications, 42, 3, pp. 122-134, (2021)
  • [9] ZHOU D C, CHEN H C, CHENG G Z, Et al., Design and implementation of adaptive mimic voting device oriented to persistent connection, Journal on Communications, 43, 6, pp. 71-84, (2022)
  • [10] ZHANG J, GE Q, XU W H, Et al., Design, implementation and formal verification of BGP proxy for mimic router, Journal on Communications, 44, 3, pp. 33-44, (2023)