Dynamic defense strategy against advanced persistent threat under heterogeneous networks

被引:14
|
作者
Lv, Kun [1 ]
Chen, Yun [1 ]
Hu, Changzhen [1 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing, Peoples R China
关键词
Advanced persistent threat; Dynamic defense strategy; Game theory; Information fusion; Heterogeneous network; GAME; INFORMATION; FUSION; MODEL;
D O I
10.1016/j.inffus.2019.01.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Advanced persistent threats (APTs) pose a grave threat in cyberspace because of their long latency and concealment. In this paper, we propose a hybrid strategy game-based dynamic defense model to optimally allocate constrained secure resources for the target network. In addition, values of profits of players in this game are computed by a novel data-fusion method called NetF. Based on network protocols and log documents, the NetF deciphers data packets collected from different networks to natural language to make them comparable. Using this algorithm, data observed from the Internet and wireless sensor networks (WSNs) can be fused to calculate the comprehensive payoff of every node precisely. The Nash equilibrium can be computed using the value to detect the possibility of a node being a malicious node. Using this method, the dynamic optimal defense strategy can be allocated to every node at different times, which enhances the security of the target network obviously. In experiments, we illustrate the obtained results via case studies of a cluster of heterogeneous networks. The results guide planning of optimal defense strategies for different kinds of nodes at different times.
引用
收藏
页码:216 / 226
页数:11
相关论文
共 50 条
  • [41] Discovering unknown advanced persistent threat using shared features mined by neural networks
    Shang, Longkang
    Guo, Dong
    Ji, Yuede
    Li, Qiang
    COMPUTER NETWORKS, 2021, 189
  • [42] Discovering unknown advanced persistent threat using shared features mined by neural networks
    Shang, Longkang
    Guo, Dong
    Ji, Yuede
    Li, Qiang
    Computer Networks, 2021, 189
  • [43] Security Evaluation of the Cyber Networks Under Advanced Persistent Threats
    Yang, Lu-Xing
    Li, Pengdeng
    Yang, Xiaofan
    Tang, Yuan Yan
    IEEE ACCESS, 2017, 5 : 20111 - 20123
  • [44] Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid
    Tian, Wen
    Ji, Xiaopeng
    Liu, Weiwei
    Liu, Guangjie
    Zhai, Jiangtao
    Dai, Yuewei
    Huang, Shuhua
    IEEE ACCESS, 2020, 8 (08): : 64075 - 64085
  • [45] Feasibility Approach Based on SecMonet Framework to Protect Networks from Advanced Persistent Threat Attacks
    Salem, Maher
    Mohammed, Moayyad
    ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES, 2019, 29 : 333 - 343
  • [46] E-APTDetect: Early Advanced Persistent Threat Detection in Critical Infrastructures with Dynamic Attestation
    Genge, Bela
    Haller, Piroska
    Roman, Adrian-Silviu
    APPLIED SCIENCES-BASEL, 2023, 13 (06):
  • [47] A Hierarchical Approach for Advanced Persistent Threat Detection with Attention-Based Graph Neural Networks
    Li, Zitong
    Cheng, Xiang
    Sun, Lixiao
    Zhang, Ji
    Chen, Bing
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [48] On Dynamic Recovery of Cloud Storage System Under Advanced Persistent Threats
    Li, Pengdeng
    Yang, Xiaofan
    IEEE ACCESS, 2019, 7 : 103556 - 103569
  • [49] A Dynamic Cell Range Expansion for LTE-Advanced Heterogeneous Networks
    Dai, Mengfan
    Song, Qingyang
    Ning, Zhaolong
    ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 1954 - 1957
  • [50] SECaaS-Based Partially Observable Defense Model for IIoT Against Advanced Persistent Threats
    Zhang, Zikai
    Ding, Chuntao
    Li, Yidong
    Yu, Jinhui
    Li, Jingyi
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (06) : 4267 - 4280