[1]ZHANG Jianhui,XU Sijie,ZENG Junjie,et al.A Mutation-Service Deception Collaborative Moving Target Defense Method[J].Journal of Zhengzhou University (Engineering Science),2027,48(XX):1-10.[doi:10.13705/j.issn.1671-6833.2026.04.019]
Copy
Journal of Zhengzhou University (Engineering Science)[ISSN
1671-6833/CN
41-1339/T] Volume:
48
Number of periods:
2027 XX
Page number:
1-10
Column:
Public date:
2027-12-10
- Title:
-
A Mutation-Service Deception Collaborative Moving Target Defense Method
- Author(s):
-
ZHANG Jianhui1,2, XU Sijie1, ZENG Junjie1, WANG Ruimin3
-
(1. School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou 450002, China; 2. Songshan Laboratory, Zhengzhou 450052, China; 3. School of Computer and Artificial Intelligence, Zhengzhou University, Zhengzhou 450001, China)
-
- Keywords:
-
digital twin network; moving target defense; service deception; deep reinforcement learning
- CLC:
-
TP302.1TP302.7
- DOI:
-
10.13705/j.issn.1671-6833.2026.04.019
- Abstract:
-
To address the problem that mutation-based moving target defense (MTD) strategies in digital twin network (DTN) were discretely triggered and thus could not continuously intercept malicious traffic during trigger intervals, which might result in protection gaps, a mutation-service deception collaborative MTD method was proposed, termed MSD-MTD. Building upon address and service port mutation, MSD-MTD introduced a service deception mechanism to redirect suspicious traffic within mutation intervals, thereby enhancing continuous protection.Moreover, an intrusion detection approach based on cross-node traffic alignment and feature selection was employed to perceive network states, and a deep Q-network (DQN) was used to enable adaptive selection of MTD strategies. Comparative experiments were conducted on the Mininet-WiFi platform using the CICIDS-2017, CICIDS-2018, andUNSW-NB15 datasets, with performance benchmarked against two representative address-mutation methods. The results showed that MSD-MTD achieved average defense success rates of 93.36%, 88.20%, and 95.50% on the three datasets, respectively, while the round-trip time was mainly distributed within 0—2 ms, indicating that the proposed method improved defense effectiveness while imposing only a limited impact on network service latency.