Journal on Communications ›› 2021, Vol. 42 ›› Issue (5): 13-22.doi: 10.11959/j.issn.1000-436x.2021074
• Papers • Previous Articles Next Articles
Lingcui ZHANG1,2, Fenghua LI1,2, Liang FANG1, Yunchuan GUO1, Zifu LI1
Revised:
2021-03-23
Online:
2021-05-25
Published:
2021-05-01
Supported by:
CLC Number:
Lingcui ZHANG, Fenghua LI, Liang FANG, Yunchuan GUO, Zifu LI. Fastly match threat response policies based on interval decision diagram[J]. Journal on Communications, 2021, 42(5): 13-22.
"
策略数量/个 | FIDD-H/μs | FIDD-M/μs | FIDD-L/μs | 顺序匹配/μs |
90 | 4.24 | 4.66 | 6.38 | 14.28 |
160 | 1.08 | 1.30 | 1.74 | 13.96 |
640 | 0.94 | 0.96 | 0.92 | 49.62 |
2 700 | 3.60 | 10.52 | 38.32 | 215.64 |
4 860 | 6.02 | 18.66 | 71.82 | 382.58 |
12 800 | 14.70 | 47.66 | 179.70 | 1 025.64 |
40 000 | 41.58 | 147.98 | 571.68 | 3 393.10 |
47 500 | 46.40 | 177.56 | 699.02 | 4 281.26 |
95 040 | 92.60 | 356.18 | 1 500.16 | 10 815.56 |
108 000 | 102.24 | 400.28 | 1 704.38 | 12 626.86 |
148 470 | 139.62 | 539.76 | 2 427.04 | 18 364.28 |
230 720 | 215.54 | 907.20 | 4 003.90 | 30 073.94 |
336 960 | 312.54 | 1 303.56 | 5 960.52 | 45 423.00 |
425 250 | 396.82 | 1 742.00 | 7 378.42 | 57 006.88 |
530 000 | 510.78 | 2 136.80 | 9 159.92 | 71 390.38 |
"
策略数量/个 | FIDD-H/B | FIDD-M/B | FIDD-L/B | 顺序匹配/B |
90 | 1 090 519.04 | 1 089 781.76 | 1 089 699.84 | 1 093 795.84 |
160 | 1 090 519.04 | 1 089 781.76 | 1 089 699.84 | 1 360 035.84 |
640 | 1 356 759.04 | 1 356 021.76 | 1 355 939.84 | 1 630 371.84 |
2 700 | 1 627 095.04 | 1 626 357.76 | 1 626 275.84 | 2 711 715.84 |
4 860 | 2 167 767.04 | 2 167 029.76 | 1 896 611.84 | 3 823 124.48 |
12 800 | 2 438 103.04 | 2 437 365.76 | 2 437 283.84 | 8 059 699.20 |
40 000 | 4 330 455.04 | 3 789 045.76 | 3 788 963.84 | 22 554 542.08 |
47 500 | 5 411 799.04 | 4 600 053.76 | 4 329 635.84 | 26 688 634.88 |
95 040 | 8 115 159.04 | 6 222 069.76 | 5 681 315.84 | 52 059 340.80 |
108 000 | 9 737 175.04 | 7 033 077.76 | 6 221 987.84 | 59 100 200.96 |
148 470 | 11 088 855.04 | 7 844 085.76 | 6 762 659.84 | 80 811 950.08 |
230 720 | 14 062 551.04 | 9 195 765.76 | 7 844 003.84 | 124 720 250.88 |
336 960 | 17 576 919.04 | 10 547 445.76 | 8 925 347.84 | 181 701 836.80 |
425 250 | 20 820 951.04 | 11 899 125.76 | 9 736 355.84 | 229 109 841.92 |
530 000 | 24 605 655.04 | 13 250 805.76 | 10 547 363.84 | 285 234 626.56 |
[1] | SHAMELI-SENDI A , CHERIET M , CHERIET A . Taxonomy of intrusion risk assessment and response system[J]. Computers &Security, 2014,45: 1-16. |
[2] | NESPOLI P , PAPAMARTZIVANOS D , GóMEZ MáRMOL F ,et al. Optimal countermeasures selection against cyber attacks:a comprehensive survey on reaction frameworks[J]. IEEE Communications Surveys & Tutorials, 2018,20(2): 1361-1396. |
[3] | SOMAYAJI A , FORREST S . Automated response using system-call delay[C]// Usenix Security Symposium. Berkeley:USENIX Association, 2000: 185-197. |
[4] | TOTH T , KRUEGEL C . Evaluating the impact of automated intrusion response mechanisms[C]// 18th Annual Computer Security Applications Conference. Piscataway:IEEE Press, 2002: 301-310. |
[5] | MAROUF S , SHEHAB M , SQUICCIARINI A ,et al. Adaptive reordering and clustering-based framework for efficient XACML policy evaluation[J]. IEEE Transactions on Services Computing, 2011,4(4): 300-313. |
[6] | SHAMELI-SENDI A , LOUAFI H , HE W B ,et al. Dynamic optimal countermeasure selection for intrusion response system[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(5): 755-770. |
[7] | GUO Y C , ZHANG H , LI Z F ,et al. Decision-making for intrusion response:which,where,in what order,and how long?[C]// 2020 IEEE International Conference on Communications. Piscataway:IEEE Press, 2020: 1-6. |
[8] | LI F H , LI Y J , LENG S Y ,et al. Dynamic countermeasures selection for multi-path attacks[J]. Computers & Security, 2020,97: 101927 |
[9] | ROY A , KIM D S , TRIVEDI K S . Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees[C]// IEEE/IFIP International Conference on Dependable Systems and Networks. Piscataway:IEEE Press, 2012: 1-12. |
[10] | HUGHES K , MCLAUGHLIN K , SEZER S . Dynamic countermeasure knowledge for intrusion response systems[C]// 2020 31st Irish Signals and Systems Conference. Piscataway:IEEE Press, 2020: 1-6. |
[11] | LI X , ZHOU C J , TIAN Y C ,et al. A dynamic decision-making approach for intrusion response in industrial control systems[J]. IEEE Transactions on Industrial Informatics, 2019,15(5): 2544-2554. |
[12] | KOTENKO I , DOYNIKOVA E . Selection of countermeasures against network attacks based on dynamical calculation of security metrics[J]. The Journal of Defense Modeling and Simulation:Applications,Methodology,Technology, 2018,15(2): 181-204. |
[13] | LUO Y , SZIDAROVSZKY F , AL-NASHIF Y ,et al. A game theory based risk and impact analysis method for intrusion defense systems[C]// 2009 IEEE/ACS International Conference on Computer Systems and Applications. Piscataway:IEEE Press, 2009: 975-982. |
[14] | ZONOUZ S A , KHURANA H , SANDERS W H ,et al. RRE:a game-theoretic intrusion response and recovery engine[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(2): 395-406. |
[15] | LIANG X N , XIAO Y . Game theory for network security[J]. IEEE Communications Surveys & Tutorials, 2013,15(1): 472-486. |
[16] | MANSHAEI M H , ZHU Q Y , ALPCAN T ,et al. Game theory meets network security and privacy[J]. ACM Computing Surveys, 2013,45(3): 1-39. |
[17] | MAHARJAN S , ZHU Q Y , ZHANG Y ,et al. Dependable demand response management in the smart grid:a stackelberg game approach[J]. IEEE Transactions on Smart Grid, 2013,4(1): 120-132. |
[18] | KIENNERT C , ISMAIL Z , DEBAR H ,et al. A survey on game-theoretic approaches for intrusion detection and response optimization[J]. ACM Computing Surveys, 2019,51(5): 1-31. |
[1] | Hui ZHAO, Jin LI, Weiwen MA, Wenchao DENG, Tianqi ZHANG, Yuanni LIU. Performance analysis of optical differential spatial modulation over atmospheric joint effect [J]. Journal on Communications, 2023, 44(6): 57-69. |
[2] | Long YANG, Li ZHAO, Yuchen ZHOU, Bingtao HE, Jian CHEN. Buffer-aided cooperative NOMA with power transfer [J]. Journal on Communications, 2023, 44(6): 77-89. |
[3] | Zaijian WANG, Huimin GU. Network slicing resource allocation strategy based on joint optimization [J]. Journal on Communications, 2023, 44(5): 234-245. |
[4] | Xin SUN, Guifu ZHANG, Hongyan XING, Wang Zenghui. Research on intrusion detection for maritime meteorological sensor network based on balancing generative adversarial network [J]. Journal on Communications, 2023, 44(4): 124-136. |
[5] | Li JIANG, Shengli XIE, Hui TIAN. Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network [J]. Journal on Communications, 2023, 44(3): 12-23. |
[6] | Xueyong YU, Lixiang QIU, Jianing SONG, Hongbo ZHU. Security communication and energy efficiency optimization strategy in UAV-aided edge computing [J]. Journal on Communications, 2023, 44(3): 45-54. |
[7] | Mu ZHOU, Jing ZHANG, Yong WANG, Xiaolong YANG, Lingxia LI. Optical quantum positioning method based on random resampling of scattering free path [J]. Journal on Communications, 2023, 44(3): 55-65. |
[8] | Feibo JIANG, Yubo PENG, Li DONG. Deep image semantic communication model for 6G [J]. Journal on Communications, 2023, 44(3): 198-208. |
[9] | Yi GUO, Yiqing WANG, Yuanyuan FAN, Gang LIU. OFDM transmission scheme with subcarrier supply index modulation [J]. Journal on Communications, 2023, 44(2): 104-111. |
[10] | Long LONG, Zichen LIU, Zaiwang LU, Yucheng ZHANG, Lei LI. Joint optimization strategy of service cache and resource allocation in mobile edge network [J]. Journal on Communications, 2023, 44(1): 64-74. |
[11] | Yong LIAO, Gang CHENG, Yujie LI. CSI feedback algorithm based on deep unfolding for massive MIMO systems [J]. Journal on Communications, 2022, 43(12): 77-88. |
[12] | Fanglin GU, Yuzhen HUANG, Ying ZHAO, Haitao ZHAO, Jibo WEI. Adaptive anti-jamming technologies based on direct sequence spread spectrum and single carrier frequency domain equalization [J]. Journal on Communications, 2022, 43(11): 26-34. |
[13] | Geng CHEN, Shuhu QI, Fei SHEN, Qingtian ZENG. Dual time scale network slicing algorithm based on D3QN for B5G multi-service scenarios [J]. Journal on Communications, 2022, 43(11): 213-224. |
[14] | Yuliang CONG, Wenxi SUN, Ke XUE, Zhihong QIAN, Mianshu CHEN. Research on task offloading strategy of Internet of vehicles based on improved hybrid genetic algorithm [J]. Journal on Communications, 2022, 43(10): 77-85. |
[15] | Xin SU, Leilei MENG, Yiqing ZHOU, Wu CELIMUGE. Maritime mobile edge computing offloading method based on deep reinforcement learning [J]. Journal on Communications, 2022, 43(10): 133-145. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|