How to Disturb Network Reconnaissance: A Moving Target Defense Approach Based on Deep Reinforcement Learning

被引:15
|
作者
Zhang, Tao [1 ,2 ]
Xu, Changqiao [3 ]
Shen, Jiahao [4 ]
Kuang, Xiaohui [5 ,6 ]
Grieco, Luigi Alfredo [7 ,8 ]
机构
[1] Beijing Jiaotong Univ, Sch Software Engn, Beijing 100044, Peoples R China
[2] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Transp, Beijing 100044, Peoples R China
[3] State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[4] Beihang Univ, Sch Comp Sci & Engn, Beijing 100083, Peoples R China
[5] Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China
[6] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[7] Politecn Bari, Dept Elect & Informat Engn, I-70126 Bari, Italy
[8] Politecn Bari, Consorzio Nazl Interuniv Telecomunicaz CNIT, I-70126 Bari, Italy
基金
中国国家自然科学基金;
关键词
IP networks; Security; Network reconnaissance; Quality of service; Behavioral sciences; Prototypes; Deep learning; Moving target defense; host address mutation; network reconnaissance; deep reinforcement learning; INTRUSION DETECTION; WIRELESS NETWORKS; SECURITY; SYSTEM;
D O I
10.1109/TIFS.2023.3314219
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the explosive growth of Internet traffic, large sensitive and valuable information is at risk of cyber attacks, which are mostly preceded by network reconnaissance. A moving target defense technique called host address mutation (HAM) helps facing network reconnaissance. However, there still exist several fundamental problems in HAM: 1) current approaches cannot be self-adaptive to adversarial strategies; 2) network state is time-varying because each host decides whether to mutate IP address; and 3) most methods mainly focus on enhancing security, but ignore the survivability of existing connections. In this paper, an Intelligence-Driven Host Address Mutation (ID-HAM) scheme is proposed to address aforementioned challenges. We firstly model a Markov decision process (MDP) to describe the mutation process, and design a seamless mutation mechanism. Secondly, to remove infeasible actions from the action space of MDP, we formulate address-to-host assignments as a constrained satisfaction problem. Thirdly, we design an advantage actor-critic algorithm for HAM, which aims to learn from scanning behaviors. Finally, security analysis and extensive simulations highlight the effectiveness of ID-HAM. Compared with state-of-the-art solutions, ID-HAM can decrease maximum 25% times of scanning hits while only influencing communication slightly. We also implemented a proof-of-concept prototype system to conduct experiments with multiple scanning tools.
引用
收藏
页码:5735 / 5748
页数:14
相关论文
共 50 条
  • [1] Deep reinforcement learning-based moving target defense method in computing power network
    Zhang, Tao
    Xu, Changqiao
    Lian, Yibo
    Kang, Jiawen
    Kuang, Xiaohui
    [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2023, 53 (12): : 2372 - 2385
  • [2] EVADE: Efficient Moving Target Defense for Autonomous Network Topology Shuffling Using Deep Reinforcement Learning
    Zhang, Qisheng
    Cho, Jin-Hee
    Moore, Terrence J.
    Kim, Dan Dongseong
    Lim, Hyuk
    Nelson, Frederica
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023, 2023, 13905 : 555 - 582
  • [3] Research on Target Defense Strategy Based on Deep Reinforcement Learning
    Luo, Yuelin
    Gang, Tieqiang
    Chen, Lijie
    [J]. IEEE ACCESS, 2022, 10 : 82329 - 82335
  • [4] DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework
    Yoon, Seunghyun
    Cho, Jin-Hee
    Kim, Dong Seong
    Moore, Terrence J.
    Free-Nelson, Frederica
    Lim, Hyuk
    [J]. IEEE ACCESS, 2021, 9 : 70700 - 70714
  • [5] Moving Target Defense Strategy Optimization Scheme for Cloud NativeEnvironment Based on Deep Reinforcement Learning br
    Zhang, Shuai
    Guo, Yunfei
    Sun, Penghao
    Cheng, Guozhen
    Hu, Hongchao
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2023, 45 (02) : 608 - 616
  • [6] Moving Target Defense Against Network Reconnaissance with Software Defined Networking
    Wang, Li
    Wu, Dinghao
    [J]. INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 203 - 217
  • [7] Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack
    Xu, Xiaoyu
    Hu, Hao
    Liu, Yuling
    Tan, Jinglei
    Zhang, Hongqi
    Song, Haotian
    [J]. DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (03) : 373 - 387
  • [8] Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack
    Xiaoyu Xu
    Hao Hu
    Yuling Liu
    Jinglei Tan
    Hongqi Zhang
    Haotian Song
    [J]. Digital Communications and Networks., 2022, 8 (03) - 387
  • [9] DIVERGENCE: Deep Reinforcement Learning-Based Adaptive Traffic Inspection and Moving Target Defense Countermeasure Framework
    Kim, Sunghwan
    Yoon, Seunghyun
    Cho, Jin-Hee
    Kim, Dong Seong
    Moore, Terrence J.
    Free-Nelson, Frederica
    Lim, Hyuk
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (04): : 4834 - 4846
  • [10] Moving Target Defense for In-Vehicle Software-Defined Networking: IP Shuffling in Network Slicing with Multiagent Deep Reinforcement Learning
    Yoon, Seunghyun
    Cho, Jin-Hee
    Kim, Dong Seong
    Moore, Terrence J.
    Nelson, Frederica F.
    Lim, Hyuk
    Leslie, Nandi
    Kamhoua, Charles A.
    [J]. ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS II, 2020, 11413