How to Disturb Network Reconnaissance: A Moving Target Defense Approach Based on Deep Reinforcement Learning

被引:15
|
作者
Zhang, Tao [1 ,2 ]
Xu, Changqiao [3 ]
Shen, Jiahao [4 ]
Kuang, Xiaohui [5 ,6 ]
Grieco, Luigi Alfredo [7 ,8 ]
机构
[1] Beijing Jiaotong Univ, Sch Software Engn, Beijing 100044, Peoples R China
[2] Beijing Jiaotong Univ, Beijing Key Lab Secur & Privacy Intelligent Transp, Beijing 100044, Peoples R China
[3] State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[4] Beihang Univ, Sch Comp Sci & Engn, Beijing 100083, Peoples R China
[5] Natl Key Lab Sci & Technol Informat Syst Secur, Beijing 100101, Peoples R China
[6] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[7] Politecn Bari, Dept Elect & Informat Engn, I-70126 Bari, Italy
[8] Politecn Bari, Consorzio Nazl Interuniv Telecomunicaz CNIT, I-70126 Bari, Italy
基金
中国国家自然科学基金;
关键词
IP networks; Security; Network reconnaissance; Quality of service; Behavioral sciences; Prototypes; Deep learning; Moving target defense; host address mutation; network reconnaissance; deep reinforcement learning; INTRUSION DETECTION; WIRELESS NETWORKS; SECURITY; SYSTEM;
D O I
10.1109/TIFS.2023.3314219
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the explosive growth of Internet traffic, large sensitive and valuable information is at risk of cyber attacks, which are mostly preceded by network reconnaissance. A moving target defense technique called host address mutation (HAM) helps facing network reconnaissance. However, there still exist several fundamental problems in HAM: 1) current approaches cannot be self-adaptive to adversarial strategies; 2) network state is time-varying because each host decides whether to mutate IP address; and 3) most methods mainly focus on enhancing security, but ignore the survivability of existing connections. In this paper, an Intelligence-Driven Host Address Mutation (ID-HAM) scheme is proposed to address aforementioned challenges. We firstly model a Markov decision process (MDP) to describe the mutation process, and design a seamless mutation mechanism. Secondly, to remove infeasible actions from the action space of MDP, we formulate address-to-host assignments as a constrained satisfaction problem. Thirdly, we design an advantage actor-critic algorithm for HAM, which aims to learn from scanning behaviors. Finally, security analysis and extensive simulations highlight the effectiveness of ID-HAM. Compared with state-of-the-art solutions, ID-HAM can decrease maximum 25% times of scanning hits while only influencing communication slightly. We also implemented a proof-of-concept prototype system to conduct experiments with multiple scanning tools.
引用
收藏
页码:5735 / 5748
页数:14
相关论文
共 50 条
  • [31] A Brief review on Network Identity-based Moving Target Defense
    Saputro, Nico
    [J]. 2023 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING, ICOIN, 2023, : 610 - 615
  • [32] Thwart Eavesdropping Attacks on Network Communication Based on Moving Target Defense
    Ma, Duohe
    Wang, Liming
    Lei, Cheng
    Xu, Zhen
    Zhang, Hongqi
    Li, Meng
    [J]. 2016 IEEE 35TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2016,
  • [33] SDN-based solutions for Moving Target Defense network protection
    Kampanakis, Panos
    Perros, Harry
    Beyene, Tsegereda
    [J]. 2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2014,
  • [34] Empirical Assessment of Network-based Moving Target Defense Approaches
    Van Leeuwen, Brian P.
    Stout, William M. S.
    Urias, Vincent E.
    [J]. MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 764 - 769
  • [35] t-soft update of target network for deep reinforcement learning
    Kobayashi, Taisuke
    Ilboudo, Wendyam Eric Lionel
    [J]. NEURAL NETWORKS, 2021, 136 : 63 - 71
  • [36] Strengthening Network-Based Moving Target Defense with Disposable Identifiers
    Park, Taekeun
    Kim, Keewon
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (10) : 1799 - 1802
  • [37] Network Security Defense Decision-Making Method Based on Stochastic Game and Deep Reinforcement Learning
    Wu, Zenan
    Tian, Liqin
    Wang, Yan
    Xie, Jianfei
    Du, Yuquan
    Zhang, Yi
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [38] A Reinforcement Learning Based Multiple Strategy Framework for Tracking a Moving Target
    Huo, Zixuan
    Dai, Shilong
    Yuan, Mingxing
    Chen, Xiang
    Zhang, Xuebo
    [J]. 2020 IEEE/ASME INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT MECHATRONICS (AIM), 2020, : 1292 - 1297
  • [39] Resource Management at the Network Edge: A Deep Reinforcement Learning Approach
    Zeng, Deze
    Gu, Lin
    Pan, Shengli
    Cai, Jingjing
    Guo, Song
    [J]. IEEE NETWORK, 2019, 33 (03): : 26 - 33
  • [40] Intercept Strategy for Maneuvering Target Based on Deep Reinforcement Learning
    Wang, Xu
    Cai, Yuanli
    Fang, Yizhong
    Deng, Yifan
    [J]. 2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 3547 - 3552