Paper
11 October 2023 Method for selecting defense strategy of moving targets based on signal game in industrial internet
Mingxuan Yin, Chenguang Gao
Author Affiliations +
Proceedings Volume 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023); 128001W (2023) https://doi.org/10.1117/12.3004041
Event: 6th International Conference on Computer Information Science and Application Technology (CISAT 2023), 2023, Hangzhou, China
Abstract
In recent years, more and more computer technology has been applied in industrial Internet, the vulnerability and security risk of industrial control systems are gradually increasing. network security issues have received much attention. To address the complex attacks and relatively poor deployable defense resources in the Industrial Internet, this paper combines industrial Internet attacks with signal game theory, proposes a moving target defense strategy selection method. The SDN-based industrial Internet attack and defense model is established, the core decision module and the moving target defense module are introduced to select and implement the best defense strategy respectively, so that the industrial Internet can achieve the best security defense strategy. The simulation results show that the moving target defense strategy selection method based on the signal game can effectively improve the defender's gain and achieve the best defense against network attacks under the industrial Internet.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Mingxuan Yin and Chenguang Gao "Method for selecting defense strategy of moving targets based on signal game in industrial internet", Proc. SPIE 12800, Sixth International Conference on Computer Information Science and Application Technology (CISAT 2023), 128001W (11 October 2023); https://doi.org/10.1117/12.3004041
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Defense and security

Internet

Control systems

Detection theory

Detection and tracking algorithms

Network security

Defense technologies

Back to Top