Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy
Dynamic Heterogeneous Redundancy (DHR) has been considered as a proactive defense architecture against unknown vulnerabilities and backdoors. It is a heterogeneous, fault-tolerant, and redundant system, which ensures the security by constantly switching heterogeneous executors. However, a limited nu...
Gespeichert in:
Veröffentlicht in: | IEEE eTransactions on network and service management 2023-12, Vol.20 (4), p.1-1 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1 |
---|---|
container_issue | 4 |
container_start_page | 1 |
container_title | IEEE eTransactions on network and service management |
container_volume | 20 |
creator | Shi, Leyi Miao, Yifan Ren, Jiahao Liu, Ran |
description | Dynamic Heterogeneous Redundancy (DHR) has been considered as a proactive defense architecture against unknown vulnerabilities and backdoors. It is a heterogeneous, fault-tolerant, and redundant system, which ensures the security by constantly switching heterogeneous executors. However, a limited number of heterogeneous executors can be merely switched and combined statically. It is difficult to cope with persistent threats. In this paper, we propose an evolutionary DHR system, add evolutionary sub-strategies of executors to solve this problem, optimizing defense mechanisms of DHR. To demonstrate theoretical validity, a game-theoretic analysis of the DHR security mechanism is performed under dynamic incomplete information, and the dilemma of defense is discussed. We construct a DHR game model based on evolutionary, and the results are extended to the general case to analyze the Bayesian equilibrium when each service strategy has a different number of evolved sub-strategies. In addition, the correlation factor is added to the game to investigate the impact of the correlation between different heterogeneous executors on defense results. Finally, Gambit and NS2 simulation experiments for the proposed method are shown. To verify the applicability of the physical system, a prototype DHR system based on dynamic evolution was constructed. We collect key configuration information and modified them randomly. It ensures that the information scanned by the attacker is different each time. Finally, the effectiveness of the physical system is verified by nmap and metasploit tools. |
doi_str_mv | 10.1109/TNSM.2023.3275986 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10124232</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10124232</ieee_id><sourcerecordid>2901247232</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-1fc6c917da461f8a98a5c5e8bbfc74094a42e22380779fc85a6edb7a6c37a66a3</originalsourceid><addsrcrecordid>eNpNkEtLw0AUhQdRsFZ_gOAi4DpxXslkllK1FeoDrevhdnIjKU2mziRC_PUmtItu7gPOOXA-Qq4ZTRij-m71-vmScMpFIrhKdZ6dkAnTgscyFer06D4nFyFsKE1zpvmEvM-hxgga2PahCsNRRG7XVnX1B23lmqh0PsJft-3GD3wfPfQN1JWNFtiid9_YoOtC9IFF1xTQ2P6SnJWwDXh12FPy9fS4mi3i5dv8eXa_jC2XWRuz0mZWM1WAzFiZg84htSnm63VplaRaguTIucipUrq0eQoZFmsFmRXDyEBMye0-d-fdT4ehNRvX-aFHMFxTxqXigg8qtldZ70LwWJqdr-qhh2HUjODMCM6M4MwB3OC52XsqRDzSD5lj5D8DeWs0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2901247232</pqid></control><display><type>article</type><title>Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy</title><source>IEEE Electronic Library (IEL)</source><creator>Shi, Leyi ; Miao, Yifan ; Ren, Jiahao ; Liu, Ran</creator><creatorcontrib>Shi, Leyi ; Miao, Yifan ; Ren, Jiahao ; Liu, Ran</creatorcontrib><description>Dynamic Heterogeneous Redundancy (DHR) has been considered as a proactive defense architecture against unknown vulnerabilities and backdoors. It is a heterogeneous, fault-tolerant, and redundant system, which ensures the security by constantly switching heterogeneous executors. However, a limited number of heterogeneous executors can be merely switched and combined statically. It is difficult to cope with persistent threats. In this paper, we propose an evolutionary DHR system, add evolutionary sub-strategies of executors to solve this problem, optimizing defense mechanisms of DHR. To demonstrate theoretical validity, a game-theoretic analysis of the DHR security mechanism is performed under dynamic incomplete information, and the dilemma of defense is discussed. We construct a DHR game model based on evolutionary, and the results are extended to the general case to analyze the Bayesian equilibrium when each service strategy has a different number of evolved sub-strategies. In addition, the correlation factor is added to the game to investigate the impact of the correlation between different heterogeneous executors on defense results. Finally, Gambit and NS2 simulation experiments for the proposed method are shown. To verify the applicability of the physical system, a prototype DHR system based on dynamic evolution was constructed. We collect key configuration information and modified them randomly. It ensures that the information scanned by the attacker is different each time. Finally, the effectiveness of the physical system is verified by nmap and metasploit tools.</description><identifier>ISSN: 1932-4537</identifier><identifier>EISSN: 1932-4537</identifier><identifier>DOI: 10.1109/TNSM.2023.3275986</identifier><identifier>CODEN: ITNSC4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Correlation ; Correlation coefficients ; correlation factor ; DH-HEMTs ; Dynamic Heterogeneous Redundancy ; Evolution ; evolutionary strategies ; Fault tolerance ; Game theory ; Games ; heterogeneous executors ; Heuristic algorithms ; incomplete information dynamic game ; prototype system ; Prototypes ; Redundancy ; Security</subject><ispartof>IEEE eTransactions on network and service management, 2023-12, Vol.20 (4), p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-1fc6c917da461f8a98a5c5e8bbfc74094a42e22380779fc85a6edb7a6c37a66a3</cites><orcidid>0000-0002-9175-7724 ; 0000-0003-0460-1674 ; 0000-0003-3477-2538 ; 0000-0003-0821-8023</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10124232$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54737</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10124232$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Shi, Leyi</creatorcontrib><creatorcontrib>Miao, Yifan</creatorcontrib><creatorcontrib>Ren, Jiahao</creatorcontrib><creatorcontrib>Liu, Ran</creatorcontrib><title>Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy</title><title>IEEE eTransactions on network and service management</title><addtitle>T-NSM</addtitle><description>Dynamic Heterogeneous Redundancy (DHR) has been considered as a proactive defense architecture against unknown vulnerabilities and backdoors. It is a heterogeneous, fault-tolerant, and redundant system, which ensures the security by constantly switching heterogeneous executors. However, a limited number of heterogeneous executors can be merely switched and combined statically. It is difficult to cope with persistent threats. In this paper, we propose an evolutionary DHR system, add evolutionary sub-strategies of executors to solve this problem, optimizing defense mechanisms of DHR. To demonstrate theoretical validity, a game-theoretic analysis of the DHR security mechanism is performed under dynamic incomplete information, and the dilemma of defense is discussed. We construct a DHR game model based on evolutionary, and the results are extended to the general case to analyze the Bayesian equilibrium when each service strategy has a different number of evolved sub-strategies. In addition, the correlation factor is added to the game to investigate the impact of the correlation between different heterogeneous executors on defense results. Finally, Gambit and NS2 simulation experiments for the proposed method are shown. To verify the applicability of the physical system, a prototype DHR system based on dynamic evolution was constructed. We collect key configuration information and modified them randomly. It ensures that the information scanned by the attacker is different each time. Finally, the effectiveness of the physical system is verified by nmap and metasploit tools.</description><subject>Correlation</subject><subject>Correlation coefficients</subject><subject>correlation factor</subject><subject>DH-HEMTs</subject><subject>Dynamic Heterogeneous Redundancy</subject><subject>Evolution</subject><subject>evolutionary strategies</subject><subject>Fault tolerance</subject><subject>Game theory</subject><subject>Games</subject><subject>heterogeneous executors</subject><subject>Heuristic algorithms</subject><subject>incomplete information dynamic game</subject><subject>prototype system</subject><subject>Prototypes</subject><subject>Redundancy</subject><subject>Security</subject><issn>1932-4537</issn><issn>1932-4537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkEtLw0AUhQdRsFZ_gOAi4DpxXslkllK1FeoDrevhdnIjKU2mziRC_PUmtItu7gPOOXA-Qq4ZTRij-m71-vmScMpFIrhKdZ6dkAnTgscyFer06D4nFyFsKE1zpvmEvM-hxgga2PahCsNRRG7XVnX1B23lmqh0PsJft-3GD3wfPfQN1JWNFtiid9_YoOtC9IFF1xTQ2P6SnJWwDXh12FPy9fS4mi3i5dv8eXa_jC2XWRuz0mZWM1WAzFiZg84htSnm63VplaRaguTIucipUrq0eQoZFmsFmRXDyEBMye0-d-fdT4ehNRvX-aFHMFxTxqXigg8qtldZ70LwWJqdr-qhh2HUjODMCM6M4MwB3OC52XsqRDzSD5lj5D8DeWs0</recordid><startdate>20231201</startdate><enddate>20231201</enddate><creator>Shi, Leyi</creator><creator>Miao, Yifan</creator><creator>Ren, Jiahao</creator><creator>Liu, Ran</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-9175-7724</orcidid><orcidid>https://orcid.org/0000-0003-0460-1674</orcidid><orcidid>https://orcid.org/0000-0003-3477-2538</orcidid><orcidid>https://orcid.org/0000-0003-0821-8023</orcidid></search><sort><creationdate>20231201</creationdate><title>Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy</title><author>Shi, Leyi ; Miao, Yifan ; Ren, Jiahao ; Liu, Ran</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-1fc6c917da461f8a98a5c5e8bbfc74094a42e22380779fc85a6edb7a6c37a66a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Correlation</topic><topic>Correlation coefficients</topic><topic>correlation factor</topic><topic>DH-HEMTs</topic><topic>Dynamic Heterogeneous Redundancy</topic><topic>Evolution</topic><topic>evolutionary strategies</topic><topic>Fault tolerance</topic><topic>Game theory</topic><topic>Games</topic><topic>heterogeneous executors</topic><topic>Heuristic algorithms</topic><topic>incomplete information dynamic game</topic><topic>prototype system</topic><topic>Prototypes</topic><topic>Redundancy</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shi, Leyi</creatorcontrib><creatorcontrib>Miao, Yifan</creatorcontrib><creatorcontrib>Ren, Jiahao</creatorcontrib><creatorcontrib>Liu, Ran</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE eTransactions on network and service management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Shi, Leyi</au><au>Miao, Yifan</au><au>Ren, Jiahao</au><au>Liu, Ran</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy</atitle><jtitle>IEEE eTransactions on network and service management</jtitle><stitle>T-NSM</stitle><date>2023-12-01</date><risdate>2023</risdate><volume>20</volume><issue>4</issue><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1932-4537</issn><eissn>1932-4537</eissn><coden>ITNSC4</coden><abstract>Dynamic Heterogeneous Redundancy (DHR) has been considered as a proactive defense architecture against unknown vulnerabilities and backdoors. It is a heterogeneous, fault-tolerant, and redundant system, which ensures the security by constantly switching heterogeneous executors. However, a limited number of heterogeneous executors can be merely switched and combined statically. It is difficult to cope with persistent threats. In this paper, we propose an evolutionary DHR system, add evolutionary sub-strategies of executors to solve this problem, optimizing defense mechanisms of DHR. To demonstrate theoretical validity, a game-theoretic analysis of the DHR security mechanism is performed under dynamic incomplete information, and the dilemma of defense is discussed. We construct a DHR game model based on evolutionary, and the results are extended to the general case to analyze the Bayesian equilibrium when each service strategy has a different number of evolved sub-strategies. In addition, the correlation factor is added to the game to investigate the impact of the correlation between different heterogeneous executors on defense results. Finally, Gambit and NS2 simulation experiments for the proposed method are shown. To verify the applicability of the physical system, a prototype DHR system based on dynamic evolution was constructed. We collect key configuration information and modified them randomly. It ensures that the information scanned by the attacker is different each time. Finally, the effectiveness of the physical system is verified by nmap and metasploit tools.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNSM.2023.3275986</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-9175-7724</orcidid><orcidid>https://orcid.org/0000-0003-0460-1674</orcidid><orcidid>https://orcid.org/0000-0003-3477-2538</orcidid><orcidid>https://orcid.org/0000-0003-0821-8023</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1932-4537 |
ispartof | IEEE eTransactions on network and service management, 2023-12, Vol.20 (4), p.1-1 |
issn | 1932-4537 1932-4537 |
language | eng |
recordid | cdi_ieee_primary_10124232 |
source | IEEE Electronic Library (IEL) |
subjects | Correlation Correlation coefficients correlation factor DH-HEMTs Dynamic Heterogeneous Redundancy Evolution evolutionary strategies Fault tolerance Game theory Games heterogeneous executors Heuristic algorithms incomplete information dynamic game prototype system Prototypes Redundancy Security |
title | Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T14%3A45%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Game%20analysis%20and%20optimization%20for%20evolutionary%20Dynamic%20Heterogeneous%20Redundancy&rft.jtitle=IEEE%20eTransactions%20on%20network%20and%20service%20management&rft.au=Shi,%20Leyi&rft.date=2023-12-01&rft.volume=20&rft.issue=4&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1932-4537&rft.eissn=1932-4537&rft.coden=ITNSC4&rft_id=info:doi/10.1109/TNSM.2023.3275986&rft_dat=%3Cproquest_RIE%3E2901247232%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2901247232&rft_id=info:pmid/&rft_ieee_id=10124232&rfr_iscdi=true |