A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction
As an important deception defense method, a honeypot can be used to enhance the network’s active defense capability effectively. However, the existing rigid deployment method makes it difficult to deal with the uncertain strategic attack behaviors of the attackers. To solve such a problem, we propos...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2021-10, Vol.2021, p.1-15 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 15 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | Security and communication networks |
container_volume | 2021 |
creator | Gao, Yazhuo Zhang, Guomin Xing, Changyou |
description | As an important deception defense method, a honeypot can be used to enhance the network’s active defense capability effectively. However, the existing rigid deployment method makes it difficult to deal with the uncertain strategic attack behaviors of the attackers. To solve such a problem, we propose a multiphase dynamic deployment mechanism of virtualized honeypots (MD2VH) based on the intelligent attack path prediction method. MD2VH depicts the attack and defense characteristics of both attackers and defenders through the Bayesian state attack graph, establishes a multiphase dynamic deployment optimization model of the virtualized honeypots based on the extended Markov’s decision-making process, and generates the deployment strategies dynamically by combining the online and offline reinforcement learning methods. Besides, we also implement a prototype system based on software-defined network and virtualization container, so as to evaluate the effectiveness of MD2VH. Experiments results show that the capture rate of MD2VH is maintained at about 90% in the case of both simple topology and complex topology. Compared with the simple intelligent deployment strategy, such a metric is increased by 20% to 60%, and the result is more stable under different types of the attacker’s strategy. |
doi_str_mv | 10.1155/2021/6378218 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2589582726</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2589582726</sourcerecordid><originalsourceid>FETCH-LOGICAL-c337t-110a9c950d34bb26f60ac582d0660b0b6cbfef4e336e9023c07e4e1da01fed593</originalsourceid><addsrcrecordid>eNp9kD1PwzAURSMEEqWw8QMsMUKoPxKnGUsLtFIrOgBr5DgvxCWxg-0IhV9PqlaMTO8O594nnSC4JviekDieUEzJhLNkSsn0JBiRlKUhJpSe_mUSnQcXzu0w5iRKolGgZ2jT1V61lXCAFr0WjZJoAW1t-ga0RxuQldDKNciU6F1Z34la_UCBlkZD3xrv0MNQLZDRaKU91LX62Pdm3gv5ibbCV2hroVDSK6Mvg7NS1A6ujnccvD09vs6X4frleTWfrUPJWOJDQrBIZRrjgkV5TnnJsZDxlBaYc5zjnMu8hDICxjikmDKJE4iAFAKTEoo4ZePg5rDbWvPVgfPZznRWDy8zGk_TYSqhfKDuDpS0xjkLZdZa1QjbZwRne6PZ3mh2NDrgtwe8UroQ3-p_-hdyK3ZM</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2589582726</pqid></control><display><type>article</type><title>A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction</title><source>Wiley-Blackwell Open Access Titles</source><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Gao, Yazhuo ; Zhang, Guomin ; Xing, Changyou</creator><contributor>Babaie, Shahram ; Shahram Babaie</contributor><creatorcontrib>Gao, Yazhuo ; Zhang, Guomin ; Xing, Changyou ; Babaie, Shahram ; Shahram Babaie</creatorcontrib><description>As an important deception defense method, a honeypot can be used to enhance the network’s active defense capability effectively. However, the existing rigid deployment method makes it difficult to deal with the uncertain strategic attack behaviors of the attackers. To solve such a problem, we propose a multiphase dynamic deployment mechanism of virtualized honeypots (MD2VH) based on the intelligent attack path prediction method. MD2VH depicts the attack and defense characteristics of both attackers and defenders through the Bayesian state attack graph, establishes a multiphase dynamic deployment optimization model of the virtualized honeypots based on the extended Markov’s decision-making process, and generates the deployment strategies dynamically by combining the online and offline reinforcement learning methods. Besides, we also implement a prototype system based on software-defined network and virtualization container, so as to evaluate the effectiveness of MD2VH. Experiments results show that the capture rate of MD2VH is maintained at about 90% in the case of both simple topology and complex topology. Compared with the simple intelligent deployment strategy, such a metric is increased by 20% to 60%, and the result is more stable under different types of the attacker’s strategy.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1155/2021/6378218</identifier><language>eng</language><publisher>London: Hindawi</publisher><subject>Algorithms ; Deception ; Decision making ; Defense ; Game theory ; Machine learning ; Multiphase ; Neural networks ; Optimization ; Path predictors ; Software-defined networking ; Strategy ; Topology</subject><ispartof>Security and communication networks, 2021-10, Vol.2021, p.1-15</ispartof><rights>Copyright © 2021 Yazhuo Gao et al.</rights><rights>Copyright © 2021 Yazhuo Gao et al. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c337t-110a9c950d34bb26f60ac582d0660b0b6cbfef4e336e9023c07e4e1da01fed593</citedby><cites>FETCH-LOGICAL-c337t-110a9c950d34bb26f60ac582d0660b0b6cbfef4e336e9023c07e4e1da01fed593</cites><orcidid>0000-0001-6917-0225 ; 0000-0003-0132-7040</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><contributor>Babaie, Shahram</contributor><contributor>Shahram Babaie</contributor><creatorcontrib>Gao, Yazhuo</creatorcontrib><creatorcontrib>Zhang, Guomin</creatorcontrib><creatorcontrib>Xing, Changyou</creatorcontrib><title>A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction</title><title>Security and communication networks</title><description>As an important deception defense method, a honeypot can be used to enhance the network’s active defense capability effectively. However, the existing rigid deployment method makes it difficult to deal with the uncertain strategic attack behaviors of the attackers. To solve such a problem, we propose a multiphase dynamic deployment mechanism of virtualized honeypots (MD2VH) based on the intelligent attack path prediction method. MD2VH depicts the attack and defense characteristics of both attackers and defenders through the Bayesian state attack graph, establishes a multiphase dynamic deployment optimization model of the virtualized honeypots based on the extended Markov’s decision-making process, and generates the deployment strategies dynamically by combining the online and offline reinforcement learning methods. Besides, we also implement a prototype system based on software-defined network and virtualization container, so as to evaluate the effectiveness of MD2VH. Experiments results show that the capture rate of MD2VH is maintained at about 90% in the case of both simple topology and complex topology. Compared with the simple intelligent deployment strategy, such a metric is increased by 20% to 60%, and the result is more stable under different types of the attacker’s strategy.</description><subject>Algorithms</subject><subject>Deception</subject><subject>Decision making</subject><subject>Defense</subject><subject>Game theory</subject><subject>Machine learning</subject><subject>Multiphase</subject><subject>Neural networks</subject><subject>Optimization</subject><subject>Path predictors</subject><subject>Software-defined networking</subject><subject>Strategy</subject><subject>Topology</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><sourceid>RHX</sourceid><sourceid>BENPR</sourceid><recordid>eNp9kD1PwzAURSMEEqWw8QMsMUKoPxKnGUsLtFIrOgBr5DgvxCWxg-0IhV9PqlaMTO8O594nnSC4JviekDieUEzJhLNkSsn0JBiRlKUhJpSe_mUSnQcXzu0w5iRKolGgZ2jT1V61lXCAFr0WjZJoAW1t-ga0RxuQldDKNciU6F1Z34la_UCBlkZD3xrv0MNQLZDRaKU91LX62Pdm3gv5ibbCV2hroVDSK6Mvg7NS1A6ujnccvD09vs6X4frleTWfrUPJWOJDQrBIZRrjgkV5TnnJsZDxlBaYc5zjnMu8hDICxjikmDKJE4iAFAKTEoo4ZePg5rDbWvPVgfPZznRWDy8zGk_TYSqhfKDuDpS0xjkLZdZa1QjbZwRne6PZ3mh2NDrgtwe8UroQ3-p_-hdyK3ZM</recordid><startdate>20211021</startdate><enddate>20211021</enddate><creator>Gao, Yazhuo</creator><creator>Zhang, Guomin</creator><creator>Xing, Changyou</creator><general>Hindawi</general><general>Hindawi Limited</general><scope>RHU</scope><scope>RHW</scope><scope>RHX</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0001-6917-0225</orcidid><orcidid>https://orcid.org/0000-0003-0132-7040</orcidid></search><sort><creationdate>20211021</creationdate><title>A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction</title><author>Gao, Yazhuo ; Zhang, Guomin ; Xing, Changyou</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c337t-110a9c950d34bb26f60ac582d0660b0b6cbfef4e336e9023c07e4e1da01fed593</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Algorithms</topic><topic>Deception</topic><topic>Decision making</topic><topic>Defense</topic><topic>Game theory</topic><topic>Machine learning</topic><topic>Multiphase</topic><topic>Neural networks</topic><topic>Optimization</topic><topic>Path predictors</topic><topic>Software-defined networking</topic><topic>Strategy</topic><topic>Topology</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gao, Yazhuo</creatorcontrib><creatorcontrib>Zhang, Guomin</creatorcontrib><creatorcontrib>Xing, Changyou</creatorcontrib><collection>Hindawi Publishing Complete</collection><collection>Hindawi Publishing Subscription Journals</collection><collection>Hindawi Publishing Open Access</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gao, Yazhuo</au><au>Zhang, Guomin</au><au>Xing, Changyou</au><au>Babaie, Shahram</au><au>Shahram Babaie</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction</atitle><jtitle>Security and communication networks</jtitle><date>2021-10-21</date><risdate>2021</risdate><volume>2021</volume><spage>1</spage><epage>15</epage><pages>1-15</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>As an important deception defense method, a honeypot can be used to enhance the network’s active defense capability effectively. However, the existing rigid deployment method makes it difficult to deal with the uncertain strategic attack behaviors of the attackers. To solve such a problem, we propose a multiphase dynamic deployment mechanism of virtualized honeypots (MD2VH) based on the intelligent attack path prediction method. MD2VH depicts the attack and defense characteristics of both attackers and defenders through the Bayesian state attack graph, establishes a multiphase dynamic deployment optimization model of the virtualized honeypots based on the extended Markov’s decision-making process, and generates the deployment strategies dynamically by combining the online and offline reinforcement learning methods. Besides, we also implement a prototype system based on software-defined network and virtualization container, so as to evaluate the effectiveness of MD2VH. Experiments results show that the capture rate of MD2VH is maintained at about 90% in the case of both simple topology and complex topology. Compared with the simple intelligent deployment strategy, such a metric is increased by 20% to 60%, and the result is more stable under different types of the attacker’s strategy.</abstract><cop>London</cop><pub>Hindawi</pub><doi>10.1155/2021/6378218</doi><tpages>15</tpages><orcidid>https://orcid.org/0000-0001-6917-0225</orcidid><orcidid>https://orcid.org/0000-0003-0132-7040</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2021-10, Vol.2021, p.1-15 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_journals_2589582726 |
source | Wiley-Blackwell Open Access Titles; Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection |
subjects | Algorithms Deception Decision making Defense Game theory Machine learning Multiphase Neural networks Optimization Path predictors Software-defined networking Strategy Topology |
title | A Multiphase Dynamic Deployment Mechanism of Virtualized Honeypots Based on Intelligent Attack Path Prediction |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T20%3A14%3A31IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20Multiphase%20Dynamic%20Deployment%20Mechanism%20of%20Virtualized%20Honeypots%20Based%20on%20Intelligent%20Attack%20Path%20Prediction&rft.jtitle=Security%20and%20communication%20networks&rft.au=Gao,%20Yazhuo&rft.date=2021-10-21&rft.volume=2021&rft.spage=1&rft.epage=15&rft.pages=1-15&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1155/2021/6378218&rft_dat=%3Cproquest_cross%3E2589582726%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2589582726&rft_id=info:pmid/&rfr_iscdi=true |