Impulsive Artificial Defense Against Advanced Persistent Threat

被引:6
|
作者
Sun, Hao [1 ]
Yang, Xiaofan [1 ]
Yang, Lu-Xing [2 ]
Huang, Kaifan [1 ]
Li, Gang [2 ]
机构
[1] Chongqing Univ, Sch Big Data & Software Engn, Chongqing 400044, Peoples R China
[2] Deakin Univ, Sch Informat Technol, Melbourne, Vic 3125, Australia
基金
中国国家自然科学基金;
关键词
Advanced persistent threat; impulsive artificial APT defense; IAD problem; state evolutionary model; optimal impulsive control model; optimality system; iterative algorithm; convergence; effectiveness; GAME;
D O I
10.1109/TIFS.2023.3284564
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Advanced persistent threat (APT) as a new type of cyber espionage poses a severe threat to modern organizations. Artificial APT defense, in which an organization engages experienced cybersecurity experts to artificially check if there exist rootkits implanted by APT actors within the organizational internet and, if so, artificially remove the discovered rootkits, is recognized as an indispensable part of APT defense. There are two different ways of artificial APT defenses: continuous artificial defense (CAD), where the defense work is conducted at all time points, and impulsive artificial defense (IAD), where the defense work is conducted at a scheduled sequence of time points. IAD is superior to CAD in terms of the overall service cost. In the context of IAD, we refer to each sequence of service costs as an IAD policy. This paper addresses the problem of developing a cost-effective IAD policy (the IAD problem). First, by introducing an impulsive state evolutionary model for the organizational intranet, the IAD problem is reduced to an optimal impulsive control model (the IAD model). Second, by deriving the optimality system for the IAD model, an iterative algorithm for solving the IAD model (the IAD algorithm) is presented. Next, the convergence and effectiveness of the IAD algorithm are validated through numerical experiments. Finally, the effect of some factors is inspected. To our knowledge, this is the first time IAD is inspected from the perspective of optimal impulsive control theory.
引用
收藏
页码:3506 / 3516
页数:11
相关论文
共 50 条
  • [1] Modeling and study of defense outsourcing against advanced persistent threat through impulsive differential game approach
    Qin, Yang
    Yang, Xiaofan
    Yang, Lu-Xing
    Huang, Kaifan
    COMPUTERS & SECURITY, 2024, 145
  • [2] Dynamic Defense Strategy against Advanced Persistent Threat with Insiders
    Hu, Pengfei
    Li, Hongxing
    Fu, Hao
    Cansever, Derya
    Mohapatra, Prasant
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [3] Defense Against Advanced Persistent Threat Through Data Backup and Recovery
    Yang, Lu-Xing
    Huang, Kaifan
    Yang, Xiaofan
    Zhang, Yushu
    Xiang, Yong
    Tang, Yuan Yan
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03): : 2001 - 2013
  • [4] Dynamic defense strategy against advanced persistent threat under heterogeneous networks
    Lv, Kun
    Chen, Yun
    Hu, Changzhen
    INFORMATION FUSION, 2019, 49 : 216 - 226
  • [5] Predictive Cyber Defense Remediation against Advanced Persistent Threat in Cyber-Physical Systems
    Hasanl, Kamrul
    Shetty, Sachin
    Islam, Tariqul
    Ahmed, Imtiaz
    2022 31ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN 2022), 2022,
  • [6] Defense for Advanced Persistent Threat with Inadvertent and Malicious Insider Threats
    Chen, Ziqin
    Chen, Guanpu
    Hong, Yiguang
    UNMANNED SYSTEMS, 2024, 12 (02) : 341 - 358
  • [7] Threat Intelligence Sharing Community: A countermeasure against Advanced Persistent Threat
    Chandel, Sonali
    Yan, Mengdi
    Chen, Shaojun
    Jiang, Huan
    Ni, Tian-Yi
    2019 2ND IEEE CONFERENCE ON MULTIMEDIA INFORMATION PROCESSING AND RETRIEVAL (MIPR 2019), 2019, : 353 - 359
  • [8] A Study on Security Framework Against Advanced Persistent Threat
    Zhang, Qingyun
    Li, Huan
    Hu, Jinsong
    PROCEEDINGS OF 2017 IEEE 7TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC), 2017, : 128 - 131
  • [9] An automatic training system against Advanced Persistent Threat
    Iwata, Kazuki
    Nakamura, Yoshitaka
    Inamura, Hiroshi
    Takahashi, Osamu
    2017 TENTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORK (ICMU), 2017, : 57 - 58
  • [10] Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat
    Yang, Lu-Xing
    Li, Pengdeng
    Yang, Xiaofan
    Xiang, Yong
    Jiang, Frank
    Zhou, Wanlei
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (10): : 5977 - 5991