Effectiveness Evaluation Model of Moving Target Defense Based on System Attack Surface

被引:19
|
作者
Xiong, Xin-Li [1 ]
Yang, Lin [2 ]
Zhao, Guang-Sheng [3 ]
机构
[1] Army Engn Univ PLA, Coll Command & Control Engn, Nanjing 211101, Jiangsu, Peoples R China
[2] Acad Mil Sci PLA, Syst Engn Res Inst, Beijing 100141, Peoples R China
[3] Natl Univ Def Technol, Coll Comp Sci, Changsha 410073, Hunan, Peoples R China
来源
IEEE ACCESS | 2019年 / 7卷
关键词
Information security; moving target defense; nonhomogeneous hidden Markov processes; performance evaluation;
D O I
10.1109/ACCESS.2019.2891613
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Evaluation of moving target defense (MTD) effectiveness has become one of the fundamental problems in current studies. In this paper, an evaluation model of MTD effectiveness based on system attack surface (SAS) is proposed to extend this model covering enterprise-class topology and multi-layered moving target (MT) techniques. The model is focused on the problem of incorrect performance assessment caused by inaccurately characterizing the process of attacking and defending. Existing evaluation models often fail to describe M ID dynamically in a process. To deal with this static view, offensive and defensive process based on a player's move is presented. Besides, it converts all the attack and defense actions into the process, and interactivities are evaluated by system view extended attack surface model. Previously, the proposed attack surface models are not concerned about the links between nodes and vulnerabilities affected by topologies. After comprehensively analyzing the impact of interactions in the system, a SAS model is proposed to demonstrate how resources of the system are affected by the actions of attackers and defenders, thus ensuring the correctness of parameters for SAS in measuring MT technology. Moreover, by generating a sequence of those shifting parameters, a nonhomogeneous hierarchical hidden Markov model is used to find the possible sequence of attacking states by introducing the partial Viterbi algorithm. Also, a sequence of attacking states is defined to illustrate how adversaries are handled by MT technologies and how much additional consumption costs are increased by the system resource reconfiguration. Finally, the simulation of the proposed approach is given in a case study to demonstrate the feasibility and validity of the proposed effectiveness evaluation model in a systematic and dynamic view.
引用
收藏
页码:9998 / 10014
页数:17
相关论文
共 50 条
  • [41] Automated benchmark network diversification for realistic attack simulation with application to moving target defense
    Alexander Bajic
    Georg T. Becker
    International Journal of Information Security, 2022, 21 : 253 - 278
  • [42] Automated benchmark network diversification for realistic attack simulation with application to moving target defense
    Bajic, Alexander
    Becker, Georg T.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2022, 21 (02) : 253 - 278
  • [43] Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack
    Xu, Xiaoyu
    Hu, Hao
    Liu, Yuling
    Tan, Jinglei
    Zhang, Hongqi
    Song, Haotian
    DIGITAL COMMUNICATIONS AND NETWORKS, 2022, 8 (03) : 373 - 387
  • [44] Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack
    Xiaoyu Xu
    Hao Hu
    Yuling Liu
    Jinglei Tan
    Hongqi Zhang
    Haotian Song
    Digital Communications and Networks, 2022, 8 (03) : 373 - 387
  • [45] Attacker Skill, Defender Strategies and the Effectiveness of Migration-Based Moving Target Defense in Cyber Systems
    Ben-Asher, Noam
    Morris-King, James
    Thompson, Brian
    Glodek, William
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 21 - 30
  • [46] Optimal Timing of Moving Target Defense: A Stackelberg Game Model
    Li, Henger
    Zheng, Zizhan
    MILCOM 2019 - 2019 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM), 2019,
  • [47] Effectiveness Evaluation of Air and Missile Defense System Based on Parametric Diagrams
    Lu Fa
    Sun Wenhu
    PROCEEDINGS OF THE 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND AUTOMATION ENGINEERING, 2016, 42 : 847 - 851
  • [48] DTrap:A cyberattack-defense confrontation technique based on Moving Target Defense
    Yang, Zheng
    Sun, Degang
    Wang, Yan
    Han, Xinbo
    Meng, Chen
    Huang, Weiqing
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 2652 - 2659
  • [49] Explicit Analysis on Effectiveness and Hiddenness of Moving Target Defense in AC Power Systems
    Liu, Mengxiang
    Zhao, Chengcheng
    Zhang, Zhenyong
    Deng, Ruilong
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2022, 37 (06) : 4732 - 4746
  • [50] The Impact of Address Changes and Host Diversity on the Effectiveness of Moving Target Defense Strategy
    Zheng, Jianjun
    Namin, Akbar Siami
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 553 - 558