{"id":"https://openalex.org/W4400314817","doi":"https://doi.org/10.1109/jiot.2024.3423022","title":"Deep-Reinforcement-Learning-Based Self-Evolving Moving Target Defense Approach Against Unknown Attacks","display_name":"Deep-Reinforcement-Learning-Based Self-Evolving Moving Target Defense Approach Against Unknown Attacks","publication_year":2024,"publication_date":"2024-07-04","ids":{"openalex":"https://openalex.org/W4400314817","doi":"https://doi.org/10.1109/jiot.2024.3423022"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3423022","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3423022","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100009807","display_name":"Yuan Cao","orcid":"https://orcid.org/0000-0002-5425-7376"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yuan Cao","raw_affiliation_strings":["School of Automation, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100398807","display_name":"Kun Liu","orcid":"https://orcid.org/0000-0003-3074-7167"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun Liu","raw_affiliation_strings":["School of Automation, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025598078","display_name":"Yeming Lin","orcid":"https://orcid.org/0000-0002-3971-919X"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yeming Lin","raw_affiliation_strings":["School of Automation, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Luyao Wang","orcid":"https://orcid.org/0009-0004-4120-2546"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Luyao Wang","raw_affiliation_strings":["School of Automation, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064231378","display_name":"Yuanqing Xia","orcid":"https://orcid.org/0000-0002-5977-4911"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanqing Xia","raw_affiliation_strings":["School of Automation, Beijing Institute of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Automation, Beijing Institute of Technology, Beijing, China","institution_ids":["https://openalex.org/I125839683"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100009807"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":3.4338,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.92959741,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"11","issue":"20","first_page":"33027","last_page":"33039"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12597","display_name":"Fire Detection and Safety Systems","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.803733229637146},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7701919674873352},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5315724611282349},{"id":"https://openalex.org/keywords/self-defense","display_name":"Self defense","score":0.5175537467002869},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3319706618785858}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.803733229637146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7701919674873352},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5315724611282349},{"id":"https://openalex.org/C2993275398","wikidata":"https://www.wikidata.org/wiki/Q40283","display_name":"Self defense","level":2,"score":0.5175537467002869},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3319706618785858},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2024.3423022","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3423022","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1462643996","display_name":null,"funder_award_id":"62273041","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2301998840","display_name":null,"funder_award_id":"2021-KF-21-05","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7854905674","display_name":null,"funder_award_id":"61873034","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1576185228","https://openalex.org/W1986495842","https://openalex.org/W1999588868","https://openalex.org/W2027885472","https://openalex.org/W2041008854","https://openalex.org/W2074616737","https://openalex.org/W2086454935","https://openalex.org/W2099940443","https://openalex.org/W2147118406","https://openalex.org/W2189149472","https://openalex.org/W2194775991","https://openalex.org/W2494110282","https://openalex.org/W2591712613","https://openalex.org/W2613020517","https://openalex.org/W2736601468","https://openalex.org/W2766447205","https://openalex.org/W2884750245","https://openalex.org/W2897953716","https://openalex.org/W2899478755","https://openalex.org/W2943621039","https://openalex.org/W2952298682","https://openalex.org/W2976152462","https://openalex.org/W2996903041","https://openalex.org/W2997029642","https://openalex.org/W3013219028","https://openalex.org/W3015296286","https://openalex.org/W3044834640","https://openalex.org/W3088811935","https://openalex.org/W3099080616","https://openalex.org/W3107806454","https://openalex.org/W3212789951","https://openalex.org/W4206657397","https://openalex.org/W4206747394","https://openalex.org/W4226485672","https://openalex.org/W4281686974","https://openalex.org/W4285274733","https://openalex.org/W4321770439","https://openalex.org/W4386596944","https://openalex.org/W4387011270","https://openalex.org/W6637096788","https://openalex.org/W6737707654","https://openalex.org/W6741002519","https://openalex.org/W6780685063"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1602155137","https://openalex.org/W2593774212","https://openalex.org/W2493895773","https://openalex.org/W4213301688","https://openalex.org/W4285381597","https://openalex.org/W2390279801","https://openalex.org/W4306904969"],"abstract_inverted_index":{"Deep":[0],"reinforcement":[1],"learning":[2,33],"(DRL)-based":[3],"moving":[4],"target":[5],"defense":[6,68,94,150,179],"(MTD)":[7],"emerges":[8],"as":[9,74],"an":[10,136],"outstanding":[11],"method":[12],"to":[13,27,45,89,104,118,123,143,154],"enhance":[14,177],"the":[15,28,49,67,91,101,106,120,125,145,178],"security":[16],"of":[17,21,109,127],"highly":[18],"hostile":[19],"Internet":[20],"Things":[22],"(IoT)":[23],"environments.":[24,52],"However,":[25],"due":[26],"gap":[29],"between":[30],"certain":[31],"stationary":[32],"environment":[34,73],"and":[35,80,130,148],"real-world,":[36],"even":[37],"a":[38,56,70,75,82,163],"well-trained":[39],"DRL":[40,83,121],"model":[41,84,122],"may":[42],"not":[43],"adapt":[44],"unknown":[46,62,110,128,156,188],"attacks":[47,129],"in":[48,69,152],"real-world":[50],"network":[51,72,102,138,146],"Therefore,":[53],"we":[54,65,97,134,170],"present":[55],"DRL-based":[57],"self-evolving":[58],"MTD":[59],"approach":[60,175],"against":[61],"attacks.":[63,111,157,189],"First,":[64],"formulate":[66],"dynamic":[71],"Markov":[76],"decision":[77],"process":[78],"(MDP),":[79],"utilize":[81],"based":[85,139,165],"on":[86,140,162,166],"actor-critic":[87],"framework":[88],"obtain":[90],"optimal":[92],"sequential":[93],"strategies.":[95],"Second,":[96],"deploy":[98],"honeypots":[99],"within":[100],"environments":[103],"capture":[105],"traffic":[107],"features":[108,113],"These":[112],"are":[114],"then":[115],"specifically":[116],"labeled":[117],"enable":[119],"learn":[124],"characteristics":[126],"identify":[131],"them.":[132],"Third,":[133],"design":[135],"actor":[137],"ResNet":[141],"architecture":[142],"perceive":[144],"states":[147],"make":[149],"decisions":[151],"response":[153],"these":[155],"Finally,":[158],"through":[159],"extensive":[160],"experiments":[161],"platform":[164],"software":[167],"defined":[168],"networks,":[169],"show":[171],"that":[172],"our":[173],"proposed":[174],"can":[176],"performance":[180],"compared":[181],"with":[182,187],"state-of-the-art":[183],"solutions":[184],"when":[185],"dealing":[186]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
