Moving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network

Static characteristics of supervisory control and data acquisition (SCADA) system are often exploited to perform malicious activities on smart grids. Most of the time, the success of cyberattacks begins with the profiling of the target system and follows by the analysis of the limited resources. To...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Yifan Hu, Peng Xun, Peidong Zhu, Wenjie Kang, Yinqiao Xiong, Yufei Zhu, Weiheng Shi, Chenxi Hu
Formato: article
Lenguaje:EN
Publicado: Hindawi-Wiley 2021
Materias:
Acceso en línea:https://doaj.org/article/25873da59a2744db8663168b4acadf43
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:25873da59a2744db8663168b4acadf43
record_format dspace
spelling oai:doaj.org-article:25873da59a2744db8663168b4acadf432021-11-08T02:36:40ZMoving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network1939-012210.1155/2021/1704125https://doaj.org/article/25873da59a2744db8663168b4acadf432021-01-01T00:00:00Zhttp://dx.doi.org/10.1155/2021/1704125https://doaj.org/toc/1939-0122Static characteristics of supervisory control and data acquisition (SCADA) system are often exploited to perform malicious activities on smart grids. Most of the time, the success of cyberattacks begins with the profiling of the target system and follows by the analysis of the limited resources. To alleviate the asymmetry between attack and defense, network-based moving target defense (MTD) techniques have been applied in the network system to defend against cyberattacks by constructing a dynamic attack surface to the adversary. In this paper, we propose a novel MTD technique based on adaptive forwarding path migration (AFPM) that focuses on improving the defense capability and optimizing the network performance of path mutation. Considering the transient problems present in path mutation caused by the dynamic switching of the forwarding path, we formalize the mutation constraints based on the satisfiability modulo theory (SMT) to select the mutation path. Considering the limited defense capability of path mutation owing to the traditional mutation selection mechanism, we design the mutation path generation algorithm based on the network security capacity matrix to obtain an optimal combination of mutation path and mutation period. Finally, we compare and analyze various cyber defense techniques used in the SCADA network and demonstrate experimentally that our MTD technique can prevent more than 92% of passive monitoring under specified conditions while ensuring the quality of service (QoS) to be almost the same as the static network.Yifan HuPeng XunPeidong ZhuWenjie KangYinqiao XiongYufei ZhuWeiheng ShiChenxi HuHindawi-WileyarticleTechnology (General)T1-995Science (General)Q1-390ENSecurity and Communication Networks, Vol 2021 (2021)
institution DOAJ
collection DOAJ
language EN
topic Technology (General)
T1-995
Science (General)
Q1-390
spellingShingle Technology (General)
T1-995
Science (General)
Q1-390
Yifan Hu
Peng Xun
Peidong Zhu
Wenjie Kang
Yinqiao Xiong
Yufei Zhu
Weiheng Shi
Chenxi Hu
Moving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network
description Static characteristics of supervisory control and data acquisition (SCADA) system are often exploited to perform malicious activities on smart grids. Most of the time, the success of cyberattacks begins with the profiling of the target system and follows by the analysis of the limited resources. To alleviate the asymmetry between attack and defense, network-based moving target defense (MTD) techniques have been applied in the network system to defend against cyberattacks by constructing a dynamic attack surface to the adversary. In this paper, we propose a novel MTD technique based on adaptive forwarding path migration (AFPM) that focuses on improving the defense capability and optimizing the network performance of path mutation. Considering the transient problems present in path mutation caused by the dynamic switching of the forwarding path, we formalize the mutation constraints based on the satisfiability modulo theory (SMT) to select the mutation path. Considering the limited defense capability of path mutation owing to the traditional mutation selection mechanism, we design the mutation path generation algorithm based on the network security capacity matrix to obtain an optimal combination of mutation path and mutation period. Finally, we compare and analyze various cyber defense techniques used in the SCADA network and demonstrate experimentally that our MTD technique can prevent more than 92% of passive monitoring under specified conditions while ensuring the quality of service (QoS) to be almost the same as the static network.
format article
author Yifan Hu
Peng Xun
Peidong Zhu
Wenjie Kang
Yinqiao Xiong
Yufei Zhu
Weiheng Shi
Chenxi Hu
author_facet Yifan Hu
Peng Xun
Peidong Zhu
Wenjie Kang
Yinqiao Xiong
Yufei Zhu
Weiheng Shi
Chenxi Hu
author_sort Yifan Hu
title Moving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network
title_short Moving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network
title_full Moving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network
title_fullStr Moving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network
title_full_unstemmed Moving Target Defense Based on Adaptive Forwarding Path Migration for Securing the SCADA Network
title_sort moving target defense based on adaptive forwarding path migration for securing the scada network
publisher Hindawi-Wiley
publishDate 2021
url https://doaj.org/article/25873da59a2744db8663168b4acadf43
work_keys_str_mv AT yifanhu movingtargetdefensebasedonadaptiveforwardingpathmigrationforsecuringthescadanetwork
AT pengxun movingtargetdefensebasedonadaptiveforwardingpathmigrationforsecuringthescadanetwork
AT peidongzhu movingtargetdefensebasedonadaptiveforwardingpathmigrationforsecuringthescadanetwork
AT wenjiekang movingtargetdefensebasedonadaptiveforwardingpathmigrationforsecuringthescadanetwork
AT yinqiaoxiong movingtargetdefensebasedonadaptiveforwardingpathmigrationforsecuringthescadanetwork
AT yufeizhu movingtargetdefensebasedonadaptiveforwardingpathmigrationforsecuringthescadanetwork
AT weihengshi movingtargetdefensebasedonadaptiveforwardingpathmigrationforsecuringthescadanetwork
AT chenxihu movingtargetdefensebasedonadaptiveforwardingpathmigrationforsecuringthescadanetwork
_version_ 1718443074667937792