Please use this identifier to cite or link to this item: https://elib.vku.udn.vn/handle/123456789/4045
Title: An Adaptive Cyber Deception Approach for Active Cyber-attack Defense Method based on Deep Reinforcement Learning
Authors: Nguyen, Chi Toan
Nguyen, Hoang Hieu
Cao, Thi Bich Phuong
Phan, The Duy
Do, Hoang Hien
Keywords: Defensive Deception
Software-Defined Networking
Deep Reinforcement Learning
Honeypot Allocation
Issue Date: Jul-2024
Publisher: Vietnam-Korea University of Information and Communication Technology
Series/Report no.: CITA;
Abstract: The diverse landscape of network models, including Software-Defined Networking (SDN), Cloud Computing (C2), and Internet of Things (IoT), is evolving to meet the demands of flexibility and performance. However, these environments face numerous security challenges due to cyber-attack complexity. Traditional defense mechanisms are no longer effective against modern attacks. Therefore, Defensive Deception (DD) is proposed as an active defense approach for deceiving attackers. Despite the optimized resource deployment of both Machine Learning (ML) and Deep Learning (DL), they necessitate the usage of pre-existing datasets that have been labeled. Our paper combines Deep Reinforcement Learning (DRL) and SDN technology to establish a novel strategic deception deployment method. This combination creates a powerful security solution that generates deceptive targets and resources to attract attackers, as a result, it provides improved visibility, threat detection, response capabilities, and threat intelligence. Our experiments are implemented on a simulated SDN-based network. The experimental results show that our approach gives significant effectiveness for deception resource allocation compared to random strategies.
Description: Proceedings of the 13th International Conference on Information Technology and Its Applications (CITA 2024); pp: 343-354
URI: https://elib.vku.udn.vn/handle/123456789/4045
ISBN: 978-604-80-9774-5
Appears in Collections:CITA 2024 (Proceeding - Vol 2)

Files in This Item:

 Sign in to read



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.