Moving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network

Author:

Hu Yifan1ORCID,Xun Peng1ORCID,Zhu Peidong2ORCID,Kang Wenjie345ORCID,Xiong Yinqiao12ORCID,Zhu Yufei1ORCID,Shi Weiheng6ORCID,Hu Chenxi7ORCID

Affiliation:

1. College of Computer, National University of Defense Technology, Changsha 410073, China

2. Department of Electronic Information and Electrical Engineering, Changsha University, Changsha 410022, China

3. Hunan Provincial Key Laboratory of Network Investigational Technology, Hunan Police Academy, Changsha 410138, China

4. College of Systems Engineering, National University of Defense Technology, Changsha 410073, China

5. Key Laboratory of Police Internet of Things Application Ministry of Public Security, Beijing 100089, China

6. College of Meteorology and Oceanography, National University of Defense Technology, Nanjing 211101, China

7. College of Electrical Engineering, National University of Defense Technology, Hefei 230037, China

Abstract

Static characteristics of supervisory control and data acquisition (SCADA) system are often exploited to perform malicious activities on smart grids. Most of the time, the success of cyberattacks begins with the profiling of the target system and follows by the analysis of the limited resources. To alleviate the asymmetry between attack and defense, network-based moving target defense (MTD) techniques have been applied in the network system to defend against cyberattacks by constructing a dynamic attack surface to the adversary. In this paper, we propose a novel MTD technique based on adaptive forwarding path migration (AFPM) that focuses on improving the defense capability and optimizing the network performance of path mutation. Considering the transient problems present in path mutation caused by the dynamic switching of the forwarding path, we formalize the mutation constraints based on the satisfiability modulo theory (SMT) to select the mutation path. Considering the limited defense capability of path mutation owing to the traditional mutation selection mechanism, we design the mutation path generation algorithm based on the network security capacity matrix to obtain an optimal combination of mutation path and mutation period. Finally, we compare and analyze various cyber defense techniques used in the SCADA network and demonstrate experimentally that our MTD technique can prevent more than 92% of passive monitoring under specified conditions while ensuring the quality of service (QoS) to be almost the same as the static network.

Funder

NSFC

Publisher

Hindawi Limited

Subject

Computer Networks and Communications,Information Systems

Reference30 articles.

1. Stuxnet: Dissecting a Cyberwarfare Weapon

2. The 2015 Ukraine Blackout: Implications for False Data Injection Attacks

3. Industroyer: An in-depth look at the culprit behind ukraine’s power grid blackout;C. Osborne;ZDNet. com,2018

4. Analysis of the SYN Flood DoS Attack

5. Random host mutation for moving target defense;E. A. Shaer

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3