An Efficient Multiplex Network Model for Effective Honeypot Roaming Against DDoS Attacks

被引:1
作者
Ren, Jianguo [1 ,2 ]
Zhi, Qiang [1 ]
机构
[1] Jiangsu Normal Univ, Coll Comp Sci, Xuzhou 221116, Peoples R China
[2] Jiangsu Normal Univ, Res Ctr Complex Networks & Swarm Intelligence, Xuzhou 221116, Peoples R China
来源
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING | 2024年 / 11卷 / 02期
基金
美国国家科学基金会;
关键词
Denial-of-service attack; Roaming; Servers; Network topology; Optimization; Numerical models; Dynamic scheduling; Honeypot roaming; multiplex network; roaming frequency; network security; SERVICE; INTERNET; PROPAGATION; DYNAMICS; DEFENSE;
D O I
10.1109/TNSE.2023.3333230
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Honeypot roaming represents an effective mechanism against distributed denial of service (DDoS) attacks at the cost of system resources. Currently, the roaming frequency is set randomly, which brings the question of how often honeypots need to roam to minimize the attack impacts while preserving limited system resources. To address this challenge, this paper proposes an effective Multiplex Network Model, called MNM. First, an innovative multiplex network model composed of a normal node layer and a honeypot node layer is constructed, providing a probabilistic description of dynamical functional interaction and achieving the state transition between the two layers. Then, a condition is defined to determine whether nodes can be continuously infected during the DDoS attacks. More importantly, an optimal roaming frequency is theoretically determined using optimization theory to optimize the related parameters. A series of experimental verifications was made in three different two-layer network topologies, and the results indicate that our proposals are effective in reducing attack impacts and lowering resource consumption compared to a series of random roaming frequencies. This study can provide significant guidance for roaming honeypot design.
引用
收藏
页码:1909 / 1921
页数:13
相关论文
共 64 条
  • [1] Defense Mechanisms Against DDoS Attacks in a Cloud Computing Environment: State-of-the-Art and Research Challenges
    Agrawal, Neha
    Tapaswi, Shashikala
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (04) : 3769 - 3795
  • [2] DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark
    Alsirhani, Amjad
    Sampalli, Srinivas
    Bodorik, Peter
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2019, 16 (03): : 936 - 949
  • [3] Honeypot Allocation for Cyber Deception Under Uncertainty
    Anwar, Ahmed H.
    Kamhoua, Charles A.
    Leslie, Nandi O.
    Kiekintveld, Christopher
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 3438 - 3452
  • [4] Balarezo J. F., 2021, IEEE Access, V9
  • [5] FastMove: Fast IP switching Moving Target Defense to mitigate DDOS Attacks
    Bandi, Nahid
    Tajbakhsh, Hesam
    Analoui, Morteza
    [J]. 2021 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2021,
  • [6] Emergence of scaling in random networks
    Barabási, AL
    Albert, R
    [J]. SCIENCE, 1999, 286 (5439) : 509 - 512
  • [7] Hyperband Tuned Deep Neural Network With Well Posed Stacked Sparse AutoEncoder for Detection of DDoS Attacks in Cloud
    Bhardwaj, Aanshi
    Mangat, Veenu
    Vig, Renu
    [J]. IEEE ACCESS, 2020, 8 : 181916 - 181929
  • [8] Analysis of Epidemic Spreading With Opinion Evolution in Multiplex Network
    Bhowmick, Sourav
    Panja, Surajit
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2023, 70 (02) : 695 - 699
  • [9] Impact Assessment and Defense for Smart Grids With FDIA Against AMI
    Bi, Jichao
    Luo, Fengji
    Liang, Gaoqi
    Yang, Xiaofan
    He, Shibo
    Dong, Zhao Yang
    [J]. IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2023, 10 (02): : 578 - 591
  • [10] Optimal Filter Assignment Policy Against Distributed Denial-of-Service Attack
    Biswas, Rajorshi
    Wu, Jie
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 339 - 352