Dynamic defense strategy against advanced persistent threat under heterogeneous networks

被引:14
|
作者
Lv, Kun [1 ]
Chen, Yun [1 ]
Hu, Changzhen [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
关键词
Advanced persistent threat; Dynamic defense strategy; Game theory; Information fusion; Heterogeneous network; GAME; INFORMATION; FUSION; MODEL;
D O I
10.1016/j.inffus.2019.01.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advanced persistent threats (APTs) pose a grave threat in cyberspace because of their long latency and concealment. In this paper, we propose a hybrid strategy game-based dynamic defense model to optimally allocate constrained secure resources for the target network. In addition, values of profits of players in this game are computed by a novel data-fusion method called NetF. Based on network protocols and log documents, the NetF deciphers data packets collected from different networks to natural language to make them comparable. Using this algorithm, data observed from the Internet and wireless sensor networks (WSNs) can be fused to calculate the comprehensive payoff of every node precisely. The Nash equilibrium can be computed using the value to detect the possibility of a node being a malicious node. Using this method, the dynamic optimal defense strategy can be allocated to every node at different times, which enhances the security of the target network obviously. In experiments, we illustrate the obtained results via case studies of a cluster of heterogeneous networks. The results guide planning of optimal defense strategies for different kinds of nodes at different times.
引用
收藏
页码:216 / 226
页数:11
相关论文
共 50 条
  • [31] A systematic literature review on advanced persistent threat behaviors and its detection strategy
    Mat, Nur Ilzam Che
    Jamil, Norziana
    Yusoff, Yunus
    Kiah, Miss Laiha Mat
    JOURNAL OF CYBERSECURITY, 2024, 10 (01):
  • [32] Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack
    Rodriguez, Ricardo J.
    Chang, Xiaolin
    Li, Xiaodan
    Trivedi, Kishor S.
    GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2016, 2016, 9987 : 134 - 149
  • [33] Advanced Persistent Threat Defense System Using Self-Destructive Mechanism for Cloud Security
    Chandra, J. Vijaya
    Challa, Narasimham
    Pasupuleti, Sai Kiran
    PROCEEDINGS OF 2ND IEEE INTERNATIONAL CONFERENCE ON ENGINEERING & TECHNOLOGY ICETECH-2016, 2016, : 7 - 11
  • [34] An innovative defense strategy against targeted spreading in complex networks
    Yin, Haofei
    Cui, Xiaohua
    Zeng, An
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2024, 654
  • [35] Cloud Storage Defense Against Advanced Persistent Threats: A Prospect Theoretic Study
    Xiao, Liang
    Xu, Dongjin
    Xie, Caixia
    Mandayam, Narayan B.
    Poor, H. Vincent
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (03) : 534 - 544
  • [36] Defense scheme against advanced persistent threats in mobile fog computing security
    Waqas, Muhammad
    Tu, Shanshan
    Wan, Jialin
    Mir, Talha
    Alasmary, Hisham
    Abbas, Ghulam
    COMPUTER NETWORKS, 2023, 221
  • [37] Defense Against Advanced Persistent Threats in Smart Grids: A Reinforcement Learning Approach
    Ning, Baifeng
    Xiao, Liang
    2021 PROCEEDINGS OF THE 40TH CHINESE CONTROL CONFERENCE (CCC), 2021, : 8598 - 8603
  • [38] Prospect Theoretic Study of Cloud Storage Defense Against Advanced Persistent Threats
    Xu, Dongjin
    Li, Yanda
    Xiao, Liang
    Mandayam, Narayan B.
    Poor, H. Vincent
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [39] Dynamic Defense Strategy Against DoS Attacks Over Vehicular Ad Hoc Networks Based on Port Hopping
    Jie, Yingmo
    Li, Mingchu
    Guo, Cheng
    Chen, Ling
    IEEE ACCESS, 2018, 6 : 51374 - 51383
  • [40] An advanced persistent threat in 3G networks: Attacking the home network from roaming networks
    Xenakis, Christos
    Ntantogian, Christoforos
    COMPUTERS & SECURITY, 2014, 40 : 84 - 94