Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.Howe...Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.However,security problems in cyberspace are becoming serious,and traditional defense measures(e.g.,firewall,intrusion detection systems,and security audits)often fall into a passive situation of being prone to attacks and difficult to take effect when responding to new types of network attacks with a higher and higher degree of coordination and intelligence.By constructing and implementing the diverse strategy of dynamic transformation,the configuration characteristics of systems are constantly changing,and the probability of vulnerability exposure is increasing.Therefore,the difficulty and cost of attack are increasing,which provides new ideas for reversing the asymmetric situation of defense and attack in cyberspace.Nonetheless,few related works systematically introduce dynamic defense mechanisms for cyber security.The related concepts and development strategies of dynamic defense are rarely analyzed and summarized.To bridge this gap,we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security.Specifically,we firstly introduce basic concepts and define dynamic defense in cyber security.Next,we review the architectures,enabling techniques and methods for moving target defense and mimic defense.This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense.Finally,we discuss some open challenges and opportunities for dynamic defense in cyber security.展开更多
Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active dece...Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active deception,introduces its architecture,and expatiates on communication methods and security guarantee in information transference.Simulation results show that the DPIA can attract hacker agility and activity,lead abnormal traffic into it,distribute a large number of attack data,and ensure real network security.展开更多
China enterprises should develop dynamic strategic alliances if they want to participate in global contests and share strategic targets of global resources. The effective risk defenses system must be set up to make dy...China enterprises should develop dynamic strategic alliances if they want to participate in global contests and share strategic targets of global resources. The effective risk defenses system must be set up to make dynamic strategic alliances run successfully. This paper puts forward a mode of risk defenses internal system through analyzing the facts of China enterprises dynamic strategic alliances' creative models.展开更多
Through the analysis to the DDoS(distributed denial of service) attack, it will conclude that at different time segments, the arrive rate of normal SYN (Synchronization) package are similar, while the abnormal pac...Through the analysis to the DDoS(distributed denial of service) attack, it will conclude that at different time segments, the arrive rate of normal SYN (Synchronization) package are similar, while the abnormal packages are different with the normal ones. Toward this situation a DDoS defense algorithm based on multi-segment timeout technology is presented, more than one timeout segment are set to control the net flow. Experiment results show that in the case of little flow, multi-segment timeout has the ability dynamic defense, so the system performance is improved and the system has high response rate.展开更多
<strong>Introduction</strong><strong>:</strong> The key to success is finding the perfect mixture of tactical patterns and sudden breaks of them, which depends on the behavior of the opponent t...<strong>Introduction</strong><strong>:</strong> The key to success is finding the perfect mixture of tactical patterns and sudden breaks of them, which depends on the behavior of the opponent team and is not easy to estimate by just watching matches. According to the specific tactical team behavior of “attack vs. defense” professional football matches are investigated based on a simulation approach, professional football matches are investigated according to the specific tactical team behavior of “attack vs. defense.” <strong>Methods:</strong> The formation patterns of all the sample games are categorized by SOCCER<span style="white-space:nowrap;">©</span> for defense and attack. Monte Carlo-Simulation can evaluate the mathematical, optimal strategy. The interaction simulation between attack and defense shows optimal flexibility rates for both tactical groups. <strong>Approach: </strong>A simulation approach based on 40 position data sets of the 2014/15 German Bundesliga has been conducted to analyze and optimize such strategic team behavior in professional soccer. <strong>Results:</strong> The results revealed that both attack and defense have optimal planning rates to be more successful. The more complex the success indicator, the more successful attacking player groups get. The results also show that defensive player groups always succeed in attacking groups below a specific planning rate value.<strong> Conclusion:</strong> Groups are always succeeding. The simulation-based position data analysis shows successful strategic behavior patterns for attack and defense. Attacking player groups need very high flexibility to be successful (stay in ball possession). In contrast, defensive player groups only need to be below a defined flexibility rate to be guaranteed more success.展开更多
Estimating the global state of a networked system is an important problem in many application domains.The classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it ...Estimating the global state of a networked system is an important problem in many application domains.The classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it often observes states at a very high frequency.This inefficiency has motivated the idea of event-based method,which leverages the evolution dynamics in question and makes observations only when some rules are triggered(i.e.,only when certain conditions hold).This paper initiates the investigation of using the event-based method to estimate the equilibrium in the new application domain of cybersecurity,where equilibrium is an important metric that has no closed-form solutions.More specifically,the paper presents an event-based method for estimating cybersecurity equilibrium in the preventive and reactive cyber defense dynamics,which has been proven globally convergent.The presented study proves that the estimated equilibrium from our trigger rule i)indeed converges to the equilibrium of the dynamics and ii)is Zeno-free,which assures the usefulness of the event-based method.Numerical examples show that the event-based method can reduce 98%of the observation cost incurred by the periodic method.In order to use the event-based method in practice,this paper investigates how to bridge the gap between i)the continuous state in the dynamics model,which is dubbed probability-state because it measures the probability that a node is in the secure or compromised state,and ii)the discrete state that is often encountered in practice,dubbed sample-state because it is sampled from some nodes.This bridge may be of independent value because probability-state models have been widely used to approximate exponentially-many discrete state systems.展开更多
基金supported by the Financial and Science Technology Plan Project of Xinjiang Production and Construction Corps,under grants No.2020DB005 and No.2017DB005supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions fund.
文摘Driven by the rapid development of the Internet of Things,cloud computing and other emerging technologies,the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities.However,security problems in cyberspace are becoming serious,and traditional defense measures(e.g.,firewall,intrusion detection systems,and security audits)often fall into a passive situation of being prone to attacks and difficult to take effect when responding to new types of network attacks with a higher and higher degree of coordination and intelligence.By constructing and implementing the diverse strategy of dynamic transformation,the configuration characteristics of systems are constantly changing,and the probability of vulnerability exposure is increasing.Therefore,the difficulty and cost of attack are increasing,which provides new ideas for reversing the asymmetric situation of defense and attack in cyberspace.Nonetheless,few related works systematically introduce dynamic defense mechanisms for cyber security.The related concepts and development strategies of dynamic defense are rarely analyzed and summarized.To bridge this gap,we conduct a comprehensive and concrete survey of recent research efforts on dynamic defense in cyber security.Specifically,we firstly introduce basic concepts and define dynamic defense in cyber security.Next,we review the architectures,enabling techniques and methods for moving target defense and mimic defense.This is followed by taxonomically summarizing the implementation and evaluation of dynamic defense.Finally,we discuss some open challenges and opportunities for dynamic defense in cyber security.
基金Supported by the National Natural Science Foundation of China (No.60572131)Innovation Fund of Technol-ogy Based Firms (No.08C26213200495)+2 种基金Key tech-nologies R&D Program of Jiang su Province (No.BE 2007058)College Natural Science Foundation of Ji-angsu Province (No.08KJB520005)the Scientific Research Foundation of NUPT (No.NY206050)
文摘Aiming at the traditional passive deception models,this paper constructs a Decoy Platform based on Intelligent Agent(DPIA) to realize dynamic defense.The paper explores a new dynamic defense model based on active deception,introduces its architecture,and expatiates on communication methods and security guarantee in information transference.Simulation results show that the DPIA can attract hacker agility and activity,lead abnormal traffic into it,distribute a large number of attack data,and ensure real network security.
基金This paper is supported by Natural Science Foundation of China (No. 70172042).
文摘China enterprises should develop dynamic strategic alliances if they want to participate in global contests and share strategic targets of global resources. The effective risk defenses system must be set up to make dynamic strategic alliances run successfully. This paper puts forward a mode of risk defenses internal system through analyzing the facts of China enterprises dynamic strategic alliances' creative models.
基金Supported by the Natural Science Foundation ofHebei Province (F2004000133)
文摘Through the analysis to the DDoS(distributed denial of service) attack, it will conclude that at different time segments, the arrive rate of normal SYN (Synchronization) package are similar, while the abnormal packages are different with the normal ones. Toward this situation a DDoS defense algorithm based on multi-segment timeout technology is presented, more than one timeout segment are set to control the net flow. Experiment results show that in the case of little flow, multi-segment timeout has the ability dynamic defense, so the system performance is improved and the system has high response rate.
文摘<strong>Introduction</strong><strong>:</strong> The key to success is finding the perfect mixture of tactical patterns and sudden breaks of them, which depends on the behavior of the opponent team and is not easy to estimate by just watching matches. According to the specific tactical team behavior of “attack vs. defense” professional football matches are investigated based on a simulation approach, professional football matches are investigated according to the specific tactical team behavior of “attack vs. defense.” <strong>Methods:</strong> The formation patterns of all the sample games are categorized by SOCCER<span style="white-space:nowrap;">©</span> for defense and attack. Monte Carlo-Simulation can evaluate the mathematical, optimal strategy. The interaction simulation between attack and defense shows optimal flexibility rates for both tactical groups. <strong>Approach: </strong>A simulation approach based on 40 position data sets of the 2014/15 German Bundesliga has been conducted to analyze and optimize such strategic team behavior in professional soccer. <strong>Results:</strong> The results revealed that both attack and defense have optimal planning rates to be more successful. The more complex the success indicator, the more successful attacking player groups get. The results also show that defensive player groups always succeed in attacking groups below a specific planning rate value.<strong> Conclusion:</strong> Groups are always succeeding. The simulation-based position data analysis shows successful strategic behavior patterns for attack and defense. Attacking player groups need very high flexibility to be successful (stay in ball possession). In contrast, defensive player groups only need to be below a defined flexibility rate to be guaranteed more success.
基金supported in part by the National Natural Sciences Foundation of China(62072111)。
文摘Estimating the global state of a networked system is an important problem in many application domains.The classical approach to tackling this problem is the periodic(observation)method,which is inefficient because it often observes states at a very high frequency.This inefficiency has motivated the idea of event-based method,which leverages the evolution dynamics in question and makes observations only when some rules are triggered(i.e.,only when certain conditions hold).This paper initiates the investigation of using the event-based method to estimate the equilibrium in the new application domain of cybersecurity,where equilibrium is an important metric that has no closed-form solutions.More specifically,the paper presents an event-based method for estimating cybersecurity equilibrium in the preventive and reactive cyber defense dynamics,which has been proven globally convergent.The presented study proves that the estimated equilibrium from our trigger rule i)indeed converges to the equilibrium of the dynamics and ii)is Zeno-free,which assures the usefulness of the event-based method.Numerical examples show that the event-based method can reduce 98%of the observation cost incurred by the periodic method.In order to use the event-based method in practice,this paper investigates how to bridge the gap between i)the continuous state in the dynamics model,which is dubbed probability-state because it measures the probability that a node is in the secure or compromised state,and ii)the discrete state that is often encountered in practice,dubbed sample-state because it is sampled from some nodes.This bridge may be of independent value because probability-state models have been widely used to approximate exponentially-many discrete state systems.