Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense
Heterogeneous networks are powerful tools for describing different types of entities and relationships and are more relevant models of complex networks. The study of heterogeneous network defense is of great practical significance for protecting useful networks such as military combat networks and c...
Guardado en:
Autores principales: | , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
MDPI AG
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/576921bf25bd47c396c50d8e791ebfd5 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:576921bf25bd47c396c50d8e791ebfd5 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:576921bf25bd47c396c50d8e791ebfd52021-11-11T15:38:12ZAdversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense10.3390/electronics102126142079-9292https://doaj.org/article/576921bf25bd47c396c50d8e791ebfd52021-10-01T00:00:00Zhttps://www.mdpi.com/2079-9292/10/21/2614https://doaj.org/toc/2079-9292Heterogeneous networks are powerful tools for describing different types of entities and relationships and are more relevant models of complex networks. The study of heterogeneous network defense is of great practical significance for protecting useful networks such as military combat networks and critical infrastructure networks. However, a large amount of current research on complex network defense focuses on homogeneous networks under complete information conditions, which often ignore the real conditions such as incomplete information and heterogeneous networks. In this paper, we propose firstly a new adversarial hiding deception strategy for heterogeneous network defense under incomplete information conditions. Secondly, we propose an adversarial hiding deception network optimization method based on a genetic algorithm and design node importance index and a fitness function, which take into account the graph structure information and information about the type of nodes. Finally, we conduct comparison experiments for different defense strategies, and the results show that the proposed strategy and network optimization method are effective at hiding the critical nodes and inducing the attacker to attack the non-important nodes. The generated adversarial hiding deception network has a similar graph structure to the real network.Chen WangChengyi ZengHongfu LiuJing ChenMDPI AGarticleheterogeneous network defenseincomplete informationadversarial hiding deception strategygenetic algorithmElectronicsTK7800-8360ENElectronics, Vol 10, Iss 2614, p 2614 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
heterogeneous network defense incomplete information adversarial hiding deception strategy genetic algorithm Electronics TK7800-8360 |
spellingShingle |
heterogeneous network defense incomplete information adversarial hiding deception strategy genetic algorithm Electronics TK7800-8360 Chen Wang Chengyi Zeng Hongfu Liu Jing Chen Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense |
description |
Heterogeneous networks are powerful tools for describing different types of entities and relationships and are more relevant models of complex networks. The study of heterogeneous network defense is of great practical significance for protecting useful networks such as military combat networks and critical infrastructure networks. However, a large amount of current research on complex network defense focuses on homogeneous networks under complete information conditions, which often ignore the real conditions such as incomplete information and heterogeneous networks. In this paper, we propose firstly a new adversarial hiding deception strategy for heterogeneous network defense under incomplete information conditions. Secondly, we propose an adversarial hiding deception network optimization method based on a genetic algorithm and design node importance index and a fitness function, which take into account the graph structure information and information about the type of nodes. Finally, we conduct comparison experiments for different defense strategies, and the results show that the proposed strategy and network optimization method are effective at hiding the critical nodes and inducing the attacker to attack the non-important nodes. The generated adversarial hiding deception network has a similar graph structure to the real network. |
format |
article |
author |
Chen Wang Chengyi Zeng Hongfu Liu Jing Chen |
author_facet |
Chen Wang Chengyi Zeng Hongfu Liu Jing Chen |
author_sort |
Chen Wang |
title |
Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense |
title_short |
Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense |
title_full |
Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense |
title_fullStr |
Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense |
title_full_unstemmed |
Adversarial Hiding Deception Strategy and Network Optimization Method for Heterogeneous Network Defense |
title_sort |
adversarial hiding deception strategy and network optimization method for heterogeneous network defense |
publisher |
MDPI AG |
publishDate |
2021 |
url |
https://doaj.org/article/576921bf25bd47c396c50d8e791ebfd5 |
work_keys_str_mv |
AT chenwang adversarialhidingdeceptionstrategyandnetworkoptimizationmethodforheterogeneousnetworkdefense AT chengyizeng adversarialhidingdeceptionstrategyandnetworkoptimizationmethodforheterogeneousnetworkdefense AT hongfuliu adversarialhidingdeceptionstrategyandnetworkoptimizationmethodforheterogeneousnetworkdefense AT jingchen adversarialhidingdeceptionstrategyandnetworkoptimizationmethodforheterogeneousnetworkdefense |
_version_ |
1718434798844772352 |