{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:43Z","timestamp":1740149023219,"version":"3.37.3"},"reference-count":6,"publisher":"Wiley","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006579","name":"Ministry of Industry and Information Technology of the People\u2019s Republic of China","doi-asserted-by":"publisher","award":["JCKY2016602B001"],"id":[{"id":"10.13039\/501100006579","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2018]]},"abstract":"Currently, many methods are available to improve the target network\u2019s security. The vast majority of them cannot obtain an optimal attack path and interdict it dynamically and conveniently. Almost all defense strategies aim to repair known vulnerabilities or limit services in target network to improve security of network. These methods cannot response to the attacks in real-time because sometimes they need to wait for manufacturers releasing corresponding countermeasures to repair vulnerabilities. In this paper, we propose an improved Q-learning algorithm to plan an optimal attack path directly and automatically. Based on this path, we use software-defined network (SDN) to adjust routing paths and create hidden forwarding paths dynamically to filter vicious attack requests. Compared to other machine learning algorithms, Q-learning only needs to input the target state to its agents, which can avoid early complex training process. We improve Q-learning algorithm in two aspects. First, a reward function based on the weights of hosts and attack success rates of vulnerabilities is proposed, which can adapt to different network topologies precisely. Second, we remove the actions and merge them into every state that reduces complexity from O<\/mml:mi>(<\/mml:mo>N<\/mml:mi><\/mml:mrow>3<\/mml:mn><\/mml:mrow><\/mml:msup>)<\/mml:mo><\/mml:math> to O<\/mml:mi>(<\/mml:mo>N<\/mml:mi><\/mml:mrow>2<\/mml:mn><\/mml:mrow><\/mml:msup>)<\/mml:mo><\/mml:math>. In experiments, after deploying hidden forwarding paths, the security of target network is boosted significantly without having to repair network vulnerabilities immediately.<\/jats:p>","DOI":"10.1155\/2018\/2058429","type":"journal-article","created":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T19:31:15Z","timestamp":1524511875000},"page":"1-12","source":"Crossref","is-referenced-by-count":2,"title":["A Dynamic Hidden Forwarding Path Planning Method Based on Improved Q-Learning in SDN Environments"],"prefix":"10.1155","volume":"2018","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9106-594X","authenticated-orcid":true,"given":"Yun","family":"Chen","sequence":"first","affiliation":[{"name":"School of Software, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5411-5466","authenticated-orcid":true,"given":"Kun","family":"Lv","sequence":"additional","affiliation":[{"name":"School of Software, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2711-7060","authenticated-orcid":true,"given":"Changzhen","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Software, Beijing Institute of Technology, Beijing, China"}]}],"member":"311","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.013"},{"year":"2016","key":"6"},{"key":"11"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.24"},{"journal-title":"Network and System Security","first-page":"399","year":"2017","key":"7"},{"journal-title":"Journal of China Institute of Communications (in Chinese with English abstract)","first-page":"107","year":"2004","key":"12"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/2058429.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/2058429.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2018\/2058429.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,23]],"date-time":"2018-04-23T19:31:18Z","timestamp":1524511878000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2018\/2058429\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":6,"alternative-id":["2058429","2058429"],"URL":"https:\/\/doi.org\/10.1155\/2018\/2058429","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2018]]}}}