2022
DOI: 10.1109/tii.2021.3090719
|View full text |Cite
|
Sign up to set email alerts
|

Toward Proactive and Efficient DDoS Mitigation in IIoT Systems: A Moving Target Defense Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 36 publications
0
5
0
Order By: Relevance
“…By flexibly deploying potential targets and dynamically changing system configurations, the MTD method can create cognitive barriers for attackers, increasing the difficulty of launching attacks or reducing attack effectiveness. This architecture is often effective, especially for zero-day attacks and advanced persistent threats (APTs) [42]. However, the cost of hardware and software deployment and target migration is usually high, requiring special security design.…”
Section: A Analysis Of Existing Ddos Defense Architecturesmentioning
confidence: 99%
“…By flexibly deploying potential targets and dynamically changing system configurations, the MTD method can create cognitive barriers for attackers, increasing the difficulty of launching attacks or reducing attack effectiveness. This architecture is often effective, especially for zero-day attacks and advanced persistent threats (APTs) [42]. However, the cost of hardware and software deployment and target migration is usually high, requiring special security design.…”
Section: A Analysis Of Existing Ddos Defense Architecturesmentioning
confidence: 99%
“…The analyzed references considering Markov modelling for assessing the availability and cybersecurity of cloud and IoT systems can be divided into three groups: the references related to assessing availability and reliability [11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27], the references related to assessing cybersecurity [28][29][30][31][32][33][34][35][36][37][38][39], and references related to assessing both availability and cybersecurity as attributes of dependability of cloud and IoT systems [40][41][42][43].…”
Section: State Of the Artmentioning
confidence: 99%
“…The analysis results were utilized for facilitating a method to provide dependability assurance evidence for the Reactive Architecture. A multistage optimization problem of moving target defense mechanisms deployment was modelled in [26] as constrained by Markov decision processes. This modelling allowed maximizing the available resources of an intelligent system under the limitations of industrial Internet of Things environments.…”
Section: State Of the Artmentioning
confidence: 99%
“…Relying on the ability to make multifaceted decisions on power grid security issues, game theory is widely applied in the field of network security [9][10][11][12][13][14][15][16]. In [9], a security resource allocation game model is established to discuss the load redistribution attacks problem.…”
Section: Introductionmentioning
confidence: 99%
“…[13] establishes a Markov anti-attack model, compares the effectiveness of network space simulation defense under different attack types, and uses dynamic games with incomplete information to determine the optimal strategy; ref. [14] formulates a multistage optimization model for the deployment of a mobile target defense mechanism under a Markov decision, maximizing the profits under environmental constraints. However, each iteration solution of [13,14] depends on the revenue in the current unit time, ignoring the previous revenue, bringing in an exponential increase in complex calculations; in [15], a Markovian-Stackelberg game is proposed to simulate the sequential actions of attackers and defenders, and a secure constrained optimal power flow is given, which preserves the safety margin of key components to minimize the power outage scale and potential future risks; in [16], the adversarial interaction of the attacker and defender is modeled as a resource-constrained game, and a linear-time algorithm is used to obtain the optimal defense strategy.…”
Section: Introductionmentioning
confidence: 99%