Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy

Dynamic Heterogeneous Redundancy (DHR) has been considered as a proactive defense architecture against unknown vulnerabilities and backdoors. It is a heterogeneous, fault-tolerant, and redundant system, which ensures the security by constantly switching heterogeneous executors. However, a limited nu...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE eTransactions on network and service management 2023-12, Vol.20 (4), p.1-1
Hauptverfasser: Shi, Leyi, Miao, Yifan, Ren, Jiahao, Liu, Ran
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1
container_issue 4
container_start_page 1
container_title IEEE eTransactions on network and service management
container_volume 20
creator Shi, Leyi
Miao, Yifan
Ren, Jiahao
Liu, Ran
description Dynamic Heterogeneous Redundancy (DHR) has been considered as a proactive defense architecture against unknown vulnerabilities and backdoors. It is a heterogeneous, fault-tolerant, and redundant system, which ensures the security by constantly switching heterogeneous executors. However, a limited number of heterogeneous executors can be merely switched and combined statically. It is difficult to cope with persistent threats. In this paper, we propose an evolutionary DHR system, add evolutionary sub-strategies of executors to solve this problem, optimizing defense mechanisms of DHR. To demonstrate theoretical validity, a game-theoretic analysis of the DHR security mechanism is performed under dynamic incomplete information, and the dilemma of defense is discussed. We construct a DHR game model based on evolutionary, and the results are extended to the general case to analyze the Bayesian equilibrium when each service strategy has a different number of evolved sub-strategies. In addition, the correlation factor is added to the game to investigate the impact of the correlation between different heterogeneous executors on defense results. Finally, Gambit and NS2 simulation experiments for the proposed method are shown. To verify the applicability of the physical system, a prototype DHR system based on dynamic evolution was constructed. We collect key configuration information and modified them randomly. It ensures that the information scanned by the attacker is different each time. Finally, the effectiveness of the physical system is verified by nmap and metasploit tools.
doi_str_mv 10.1109/TNSM.2023.3275986
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_ieee_primary_10124232</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10124232</ieee_id><sourcerecordid>2901247232</sourcerecordid><originalsourceid>FETCH-LOGICAL-c246t-1fc6c917da461f8a98a5c5e8bbfc74094a42e22380779fc85a6edb7a6c37a66a3</originalsourceid><addsrcrecordid>eNpNkEtLw0AUhQdRsFZ_gOAi4DpxXslkllK1FeoDrevhdnIjKU2mziRC_PUmtItu7gPOOXA-Qq4ZTRij-m71-vmScMpFIrhKdZ6dkAnTgscyFer06D4nFyFsKE1zpvmEvM-hxgga2PahCsNRRG7XVnX1B23lmqh0PsJft-3GD3wfPfQN1JWNFtiid9_YoOtC9IFF1xTQ2P6SnJWwDXh12FPy9fS4mi3i5dv8eXa_jC2XWRuz0mZWM1WAzFiZg84htSnm63VplaRaguTIucipUrq0eQoZFmsFmRXDyEBMye0-d-fdT4ehNRvX-aFHMFxTxqXigg8qtldZ70LwWJqdr-qhh2HUjODMCM6M4MwB3OC52XsqRDzSD5lj5D8DeWs0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2901247232</pqid></control><display><type>article</type><title>Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy</title><source>IEEE Electronic Library (IEL)</source><creator>Shi, Leyi ; Miao, Yifan ; Ren, Jiahao ; Liu, Ran</creator><creatorcontrib>Shi, Leyi ; Miao, Yifan ; Ren, Jiahao ; Liu, Ran</creatorcontrib><description>Dynamic Heterogeneous Redundancy (DHR) has been considered as a proactive defense architecture against unknown vulnerabilities and backdoors. It is a heterogeneous, fault-tolerant, and redundant system, which ensures the security by constantly switching heterogeneous executors. However, a limited number of heterogeneous executors can be merely switched and combined statically. It is difficult to cope with persistent threats. In this paper, we propose an evolutionary DHR system, add evolutionary sub-strategies of executors to solve this problem, optimizing defense mechanisms of DHR. To demonstrate theoretical validity, a game-theoretic analysis of the DHR security mechanism is performed under dynamic incomplete information, and the dilemma of defense is discussed. We construct a DHR game model based on evolutionary, and the results are extended to the general case to analyze the Bayesian equilibrium when each service strategy has a different number of evolved sub-strategies. In addition, the correlation factor is added to the game to investigate the impact of the correlation between different heterogeneous executors on defense results. Finally, Gambit and NS2 simulation experiments for the proposed method are shown. To verify the applicability of the physical system, a prototype DHR system based on dynamic evolution was constructed. We collect key configuration information and modified them randomly. It ensures that the information scanned by the attacker is different each time. Finally, the effectiveness of the physical system is verified by nmap and metasploit tools.</description><identifier>ISSN: 1932-4537</identifier><identifier>EISSN: 1932-4537</identifier><identifier>DOI: 10.1109/TNSM.2023.3275986</identifier><identifier>CODEN: ITNSC4</identifier><language>eng</language><publisher>New York: IEEE</publisher><subject>Correlation ; Correlation coefficients ; correlation factor ; DH-HEMTs ; Dynamic Heterogeneous Redundancy ; Evolution ; evolutionary strategies ; Fault tolerance ; Game theory ; Games ; heterogeneous executors ; Heuristic algorithms ; incomplete information dynamic game ; prototype system ; Prototypes ; Redundancy ; Security</subject><ispartof>IEEE eTransactions on network and service management, 2023-12, Vol.20 (4), p.1-1</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2023</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c246t-1fc6c917da461f8a98a5c5e8bbfc74094a42e22380779fc85a6edb7a6c37a66a3</cites><orcidid>0000-0002-9175-7724 ; 0000-0003-0460-1674 ; 0000-0003-3477-2538 ; 0000-0003-0821-8023</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10124232$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27903,27904,54737</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10124232$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Shi, Leyi</creatorcontrib><creatorcontrib>Miao, Yifan</creatorcontrib><creatorcontrib>Ren, Jiahao</creatorcontrib><creatorcontrib>Liu, Ran</creatorcontrib><title>Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy</title><title>IEEE eTransactions on network and service management</title><addtitle>T-NSM</addtitle><description>Dynamic Heterogeneous Redundancy (DHR) has been considered as a proactive defense architecture against unknown vulnerabilities and backdoors. It is a heterogeneous, fault-tolerant, and redundant system, which ensures the security by constantly switching heterogeneous executors. However, a limited number of heterogeneous executors can be merely switched and combined statically. It is difficult to cope with persistent threats. In this paper, we propose an evolutionary DHR system, add evolutionary sub-strategies of executors to solve this problem, optimizing defense mechanisms of DHR. To demonstrate theoretical validity, a game-theoretic analysis of the DHR security mechanism is performed under dynamic incomplete information, and the dilemma of defense is discussed. We construct a DHR game model based on evolutionary, and the results are extended to the general case to analyze the Bayesian equilibrium when each service strategy has a different number of evolved sub-strategies. In addition, the correlation factor is added to the game to investigate the impact of the correlation between different heterogeneous executors on defense results. Finally, Gambit and NS2 simulation experiments for the proposed method are shown. To verify the applicability of the physical system, a prototype DHR system based on dynamic evolution was constructed. We collect key configuration information and modified them randomly. It ensures that the information scanned by the attacker is different each time. Finally, the effectiveness of the physical system is verified by nmap and metasploit tools.</description><subject>Correlation</subject><subject>Correlation coefficients</subject><subject>correlation factor</subject><subject>DH-HEMTs</subject><subject>Dynamic Heterogeneous Redundancy</subject><subject>Evolution</subject><subject>evolutionary strategies</subject><subject>Fault tolerance</subject><subject>Game theory</subject><subject>Games</subject><subject>heterogeneous executors</subject><subject>Heuristic algorithms</subject><subject>incomplete information dynamic game</subject><subject>prototype system</subject><subject>Prototypes</subject><subject>Redundancy</subject><subject>Security</subject><issn>1932-4537</issn><issn>1932-4537</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpNkEtLw0AUhQdRsFZ_gOAi4DpxXslkllK1FeoDrevhdnIjKU2mziRC_PUmtItu7gPOOXA-Qq4ZTRij-m71-vmScMpFIrhKdZ6dkAnTgscyFer06D4nFyFsKE1zpvmEvM-hxgga2PahCsNRRG7XVnX1B23lmqh0PsJft-3GD3wfPfQN1JWNFtiid9_YoOtC9IFF1xTQ2P6SnJWwDXh12FPy9fS4mi3i5dv8eXa_jC2XWRuz0mZWM1WAzFiZg84htSnm63VplaRaguTIucipUrq0eQoZFmsFmRXDyEBMye0-d-fdT4ehNRvX-aFHMFxTxqXigg8qtldZ70LwWJqdr-qhh2HUjODMCM6M4MwB3OC52XsqRDzSD5lj5D8DeWs0</recordid><startdate>20231201</startdate><enddate>20231201</enddate><creator>Shi, Leyi</creator><creator>Miao, Yifan</creator><creator>Ren, Jiahao</creator><creator>Liu, Ran</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-9175-7724</orcidid><orcidid>https://orcid.org/0000-0003-0460-1674</orcidid><orcidid>https://orcid.org/0000-0003-3477-2538</orcidid><orcidid>https://orcid.org/0000-0003-0821-8023</orcidid></search><sort><creationdate>20231201</creationdate><title>Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy</title><author>Shi, Leyi ; Miao, Yifan ; Ren, Jiahao ; Liu, Ran</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c246t-1fc6c917da461f8a98a5c5e8bbfc74094a42e22380779fc85a6edb7a6c37a66a3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Correlation</topic><topic>Correlation coefficients</topic><topic>correlation factor</topic><topic>DH-HEMTs</topic><topic>Dynamic Heterogeneous Redundancy</topic><topic>Evolution</topic><topic>evolutionary strategies</topic><topic>Fault tolerance</topic><topic>Game theory</topic><topic>Games</topic><topic>heterogeneous executors</topic><topic>Heuristic algorithms</topic><topic>incomplete information dynamic game</topic><topic>prototype system</topic><topic>Prototypes</topic><topic>Redundancy</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Shi, Leyi</creatorcontrib><creatorcontrib>Miao, Yifan</creatorcontrib><creatorcontrib>Ren, Jiahao</creatorcontrib><creatorcontrib>Liu, Ran</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE eTransactions on network and service management</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Shi, Leyi</au><au>Miao, Yifan</au><au>Ren, Jiahao</au><au>Liu, Ran</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy</atitle><jtitle>IEEE eTransactions on network and service management</jtitle><stitle>T-NSM</stitle><date>2023-12-01</date><risdate>2023</risdate><volume>20</volume><issue>4</issue><spage>1</spage><epage>1</epage><pages>1-1</pages><issn>1932-4537</issn><eissn>1932-4537</eissn><coden>ITNSC4</coden><abstract>Dynamic Heterogeneous Redundancy (DHR) has been considered as a proactive defense architecture against unknown vulnerabilities and backdoors. It is a heterogeneous, fault-tolerant, and redundant system, which ensures the security by constantly switching heterogeneous executors. However, a limited number of heterogeneous executors can be merely switched and combined statically. It is difficult to cope with persistent threats. In this paper, we propose an evolutionary DHR system, add evolutionary sub-strategies of executors to solve this problem, optimizing defense mechanisms of DHR. To demonstrate theoretical validity, a game-theoretic analysis of the DHR security mechanism is performed under dynamic incomplete information, and the dilemma of defense is discussed. We construct a DHR game model based on evolutionary, and the results are extended to the general case to analyze the Bayesian equilibrium when each service strategy has a different number of evolved sub-strategies. In addition, the correlation factor is added to the game to investigate the impact of the correlation between different heterogeneous executors on defense results. Finally, Gambit and NS2 simulation experiments for the proposed method are shown. To verify the applicability of the physical system, a prototype DHR system based on dynamic evolution was constructed. We collect key configuration information and modified them randomly. It ensures that the information scanned by the attacker is different each time. Finally, the effectiveness of the physical system is verified by nmap and metasploit tools.</abstract><cop>New York</cop><pub>IEEE</pub><doi>10.1109/TNSM.2023.3275986</doi><tpages>1</tpages><orcidid>https://orcid.org/0000-0002-9175-7724</orcidid><orcidid>https://orcid.org/0000-0003-0460-1674</orcidid><orcidid>https://orcid.org/0000-0003-3477-2538</orcidid><orcidid>https://orcid.org/0000-0003-0821-8023</orcidid></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1932-4537
ispartof IEEE eTransactions on network and service management, 2023-12, Vol.20 (4), p.1-1
issn 1932-4537
1932-4537
language eng
recordid cdi_ieee_primary_10124232
source IEEE Electronic Library (IEL)
subjects Correlation
Correlation coefficients
correlation factor
DH-HEMTs
Dynamic Heterogeneous Redundancy
Evolution
evolutionary strategies
Fault tolerance
Game theory
Games
heterogeneous executors
Heuristic algorithms
incomplete information dynamic game
prototype system
Prototypes
Redundancy
Security
title Game analysis and optimization for evolutionary Dynamic Heterogeneous Redundancy
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T14%3A45%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Game%20analysis%20and%20optimization%20for%20evolutionary%20Dynamic%20Heterogeneous%20Redundancy&rft.jtitle=IEEE%20eTransactions%20on%20network%20and%20service%20management&rft.au=Shi,%20Leyi&rft.date=2023-12-01&rft.volume=20&rft.issue=4&rft.spage=1&rft.epage=1&rft.pages=1-1&rft.issn=1932-4537&rft.eissn=1932-4537&rft.coden=ITNSC4&rft_id=info:doi/10.1109/TNSM.2023.3275986&rft_dat=%3Cproquest_RIE%3E2901247232%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2901247232&rft_id=info:pmid/&rft_ieee_id=10124232&rfr_iscdi=true