Deep-Reinforcement-Learning-Based Self-Evolving Moving Target Defense Approach Against Unknown Attacks

Yuan Cao, Kun Liu*, Yeming Lin, Luyao Wang, Yuanqing Xia

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)

Abstract

Deep reinforcement learning (DRL)-based moving target defense (MTD) emerges as an outstanding method to enhance the security of highly hostile Internet of Things (IoT) environments. However, due to the gap between certain stationary learning environment and real-world, even a well-trained DRL model may not adapt to unknown attacks in the real-world network environments. Therefore, we present a DRL-based self-evolving MTD approach against unknown attacks. First, we formulate the defense in a dynamic network environment as a Markov decision process (MDP), and utilize a DRL model based on actor-critic framework to obtain the optimal sequential defense strategies. Second, we deploy honeypots within the network environments to capture the traffic features of unknown attacks. These features are then specifically labeled to enable the DRL model to learn the characteristics of unknown attacks and identify them. Third, we design an actor network based on ResNet architecture to perceive the network states and make defense decisions in response to these unknown attacks. Finally, through extensive experiments on a platform based on software defined networks, we show that our proposed approach can enhance the defense performance compared with state-of-the-art solutions when dealing with unknown attacks.

Original languageEnglish
Pages (from-to)33027-33039
Number of pages13
JournalIEEE Internet of Things Journal
Volume11
Issue number20
DOIs
Publication statusPublished - 2024

Keywords

  • Deep reinforcement learning (DRL)
  • Internet of Things (IoT)
  • moving target defense (MTD)
  • network security
  • software-defined networks

Fingerprint

Dive into the research topics of 'Deep-Reinforcement-Learning-Based Self-Evolving Moving Target Defense Approach Against Unknown Attacks'. Together they form a unique fingerprint.

Cite this