Vui lòng dùng định danh này để trích dẫn hoặc liên kết đến tài liệu này: https://elib.vku.udn.vn/handle/123456789/4045
Nhan đề: An Adaptive Cyber Deception Approach for Active Cyber-attack Defense Method based on Deep Reinforcement Learning
Tác giả: Nguyen, Chi Toan
Nguyen, Hoang Hieu
Cao, Thi Bich Phuong
Phan, The Duy
Do, Hoang Hien
Từ khoá: Defensive Deception
Software-Defined Networking
Deep Reinforcement Learning
Honeypot Allocation
Năm xuất bản: thá-2024
Nhà xuất bản: Vietnam-Korea University of Information and Communication Technology
Tùng thư/Số báo cáo: CITA;
Tóm tắt: The diverse landscape of network models, including Software-Defined Networking (SDN), Cloud Computing (C2), and Internet of Things (IoT), is evolving to meet the demands of flexibility and performance. However, these environments face numerous security challenges due to cyber-attack complexity. Traditional defense mechanisms are no longer effective against modern attacks. Therefore, Defensive Deception (DD) is proposed as an active defense approach for deceiving attackers. Despite the optimized resource deployment of both Machine Learning (ML) and Deep Learning (DL), they necessitate the usage of pre-existing datasets that have been labeled. Our paper combines Deep Reinforcement Learning (DRL) and SDN technology to establish a novel strategic deception deployment method. This combination creates a powerful security solution that generates deceptive targets and resources to attract attackers, as a result, it provides improved visibility, threat detection, response capabilities, and threat intelligence. Our experiments are implemented on a simulated SDN-based network. The experimental results show that our approach gives significant effectiveness for deception resource allocation compared to random strategies.
Mô tả: Proceedings of the 13th International Conference on Information Technology and Its Applications (CITA 2024); pp: 343-354
Định danh: https://elib.vku.udn.vn/handle/123456789/4045
ISBN: 978-604-80-9774-5
Bộ sưu tập: CITA 2024 (Proceeding - Vol 2)

Các tập tin trong tài liệu này:

 Đăng nhập để xem toàn văn



Khi sử dụng các tài liệu trong Thư viện số phải tuân thủ Luật bản quyền.