Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Influence of Impervious Surface Area and Fractional Vegetation Cover on Seasonal Urban Surface Heating/Cooling Rates
Previous Article in Journal
Hyperspectral Image Super-Resolution with Self-Supervised Spectral-Spatial Residual Network
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Modeling and Performance Analysis of Satellite Network Moving Target Defense System with Petri Nets

1
College of Computer Science and Technology, China University of Petroleum, Qingdao 266580, China
2
Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology, Guilin 541004, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Remote Sens. 2021, 13(7), 1262; https://doi.org/10.3390/rs13071262
Submission received: 5 February 2021 / Revised: 15 March 2021 / Accepted: 17 March 2021 / Published: 26 March 2021

Abstract

:
With the development of satellite communication networks and the increase of satellite services, security problems have gradually become some of the most concerning issues. Researchers have made great efforts, including conventional safety methods such as secure transmission, anti-jamming, secure access, and especially the new generation of active defense technology represented by MTD. However, few scholars have theoretically studied the influence of active defense technique on the performance of satellite networks. Formal modeling and performance analysis have not been given sufficient attention. In this paper, we focus on the performance evaluation of satellite network moving target defense system. Firstly, two Stochastic Petri Nets (SPN) models are constructed to analyze the performance of satellite network in traditional and active defense states, respectively. Secondly, the steady-state probability of each marking in SPN models is obtained by using the isomorphism relation between SPN and Markov Chains (MC), and further key performance indicators such as average time delay, throughput, and the utilization of bandwidth are reasoned theoretically. Finally, the proposed two SPN models are simulated based on the PIPE platform. In addition, the effect of parameters on the selected performance indexes is analyzed by varying the values of different parameters. The simulation results prove the correctness of the theoretical reasoning and draw the key factors affecting the performance of satellite network, which can provide an important theoretical basis for the design and performance optimization of the satellite network moving target defense system.

1. Introduction

With the rapid development of aerospace and wireless communication technology as well as the gradual deepening of information construction, the space satellite network is developing at an unprecedented speed. As an important link network in the international communication network, satellite network is widely applied in remote sensing, detection, meteorology, communication, navigation, emergency rescue and other fields, as shown in Figure 1. Especially in the field of communication, which is an important means of information transmission and exchange in human social life, satellite communication, as a supplementary communication method of terrestrial communication, has achieved great success and has become an indispensable part of people’s life. Under the dual action of social demand and technology development, satellite communication in the 21st century is climbing to a new level.
Satellite communication refers to the communication between two or more earth stations by using artificial earth satellites as relay stations to transmit radio waves, and it is a wireless communication technology developed on the basis of microwave communication and space technology [1]. Satellite network is a special kind of communication network, which has many unique advantages compared with traditional terrestrial networks [2]:
  • Long distance communication. The cost of communication is independent of distance, so it is particularly suitable for correspondence over the long haul and in areas with few human activities;
  • Wide communication coverage. Each satellite can cover 42.4% of the global surface, and three GEO satellites can cover the global surface;
  • Wide communication band and large capacity;
  • Flexible. Satellite communications can be set up anywhere, regardless of geographical conditions, whether in large cities or remote mountainous areas;
  • Reliable communication link and strong resistance to natural disasters.
All of these unique merits make satellites play an irreplaceable role when terrestrial communication networks are unavailable or seriously damaged. In recent years, satellite networks have developed rapidly and have become an important pillar in the construction of global information infrastructure. In some countries, satellite Internet has been included in the category of “New Infrastructure” [3].
In today’s life, the increasing level of information technology has brought great convenience to society, but the threat of cyber attacks is also growing. Satellite networks are more vulnerable to the threat of break-ins and attacks due to the openness of its channels. Compared to traditional terrestrial network equipment, satellite equipment is expensive and extremely difficult to repair and recover. Once attacked, it will cause incalculable losses to the country and society [4,5]. More and more scholars have started to pay attention to the security of satellite networks, and build satellite network security protection systems by adopting effective security mechanisms to avoid as much as possible the degradation of network performance or even complete paralysis caused by various attacks. Traditional cyber security techniques such as information encryption, identity authentication and access control can enhance the communication security of satellite networks to some extent, while they can no longer meet the increasingly diversified needs of space tasks. As a result, researchers have begun to explore the application of active defense techniques such as End Hopping (EH) [6,7], Moving Target Defense (MTD) [8], and Mimic Security Defense (MSD) [9] in satellite networks. These strategies create a new way to achieve a shift from a threat-based reactive defense system to a risk-based proactive defense system, and also provide a new idea for space network security protection.
However, network security and performance are often in conflict with each other. Increasing security will lead to degradation of performance metrics (e.g., latency and throughput). Moreover, this situation is even worse in satellite networks, where on-board resources are severely limited and communication links can be easily blocked. As we all know, “there is no such thing as a free lunch”. Active network defense can achieve a high level of security in satellite networks through randomization, dynamization, and diversification, but it is also predictable that the dynamicization mechanism will bring a non-negligible additional load, thus reducing availability of the network. It is necessary for us to have a clear understanding of the cost it brings. Currently, researchers mostly focus on how to further improve the security of satellite networks, and rarely analyze the impact of these defense measures on network performance from a theoretical perspective. This motivates us to evaluate the performance of the satellite networks in a quantitative way.
Aiming to provide theoretical support for rational configuration of active defense strategies and optimization of satellite networks, in this paper, we propose to use SPN to model and analyze the performance of satellite network moving target defense system from a theoretical perspective. We develop SPN models for the communication process of satellite network in the traditional and active protection states, respectively. Then, we evaluate the performance of the satellite network moving target defense system based on the two corresponding SPN models. Through the analysis of models, performance evaluation indexes such as average time delay, throughput, and bandwidth utilization are obtained, and the impact of relevant parameters of active defense technology on network performance is further discussed.
The main contributions of this paper are summarized as follows:
  • We propose two scenarios of traditional satellite network and satellite network based on Moving Target Defense technology, respectively;
  • We propose a performance evaluation scheme of satellite network moving target defense system based on Stochastic Petri Nets (SPN). We establish SPN models for these two scenarios and evaluate their performance separately;
  • We conduct extensive simulations to validate the correctness of theoretical reasoning results and analyze the influence of various factors on the performance indexes of satellite networks. Finally, the challenges and recommendations for deploying active protection technique are given.
The remainder of this paper is organized as follows: in Section 2, we give a brief introduction to Petri Nets and active defense techniques. Then, a literature review of related work is given in Section 3. In Section 4, we establish the SPN models in two scenarios, and then conduct their performance evaluation, respectively. In Section 5, our models are simulated by the PIPE platform, based on which the results of key performance metrics are compared and analyzed, and some specific recommendations are made. In Section 6, we describe the shortcomings of our experiments and the future work. Concluding remarks are given in Section 7.

2. Background

In this section, we give some preliminaries. First, a summary of Petri Nets is given, and then a description of Stochastic Petri Nets is provided. Finally, several active defense technologies are presented.

2.1. Petri Nets

Petri Nets is a graphical and mathematical modeling tool that can be applied to many systems, and it is also a promising tool to describe and study information processing systems with concurrent, asynchronous, distributed, parallel, uncertain, or random characteristics [10]. Petri Nets has been widely focused on by researchers as soon as it is proposed, and has been widely used in a variety of fields, especially in the analysis and processing of large-scale complex systems. More and more experts and scholars use Petri Net for research. In this paper, we will use this technology to evaluate the performance. In order to make it easier to understand our follow-up work, we present here the relevant knowledge of Petri Nets.
Definition 1.
A Petri Net is represented by a five-tuple, P N =   P , T , F , W , M 0 , where:
P = P 1 , P 2 , . . . , P m T = t 1 , t 2 , . . . , t n F P × T T × P W : F { 1 , 2 , 3 , . . . } M 0 : P { 0 , 1 , 2 , 3 , . . . } P T = a n d P T =
P represents the finite set of places, which means the possible local state of the system; T represents the finite set of transitions, which describes the event that can trigger a change in the state of the system; F represents the finite set of directed arcs, which denotes the connection between the state of the system and the event, with the direction either pointing from place to transition or from transition to place. If there exists an arc that goes from a place P to a transition t, then P is termed as an input place of t. Conversely, if there exists an arc that goes from t to P, then P is termed as an output place of t. A transition may have one or more input and output places; W is called weight, which is the weight (positive integer) carried on the arc, and is 1 by default; M 0 represents the initial marking, understood as the initial state of the whole system, is an m-dimensional vector, m denotes the total number of place P, and the p th content of M, denoted M ( P ) , represents the number of tokens in the p th place; Tokens are usually contained in places, and can be transferred over different places as the transition occurs. In order to simulate the dynamic behavior of the system, the state or tokens in the Petri Net change according to the following transition (trigger) rules:
(1)
If the input position P of each transition t contains at least W p , t tokens, where W p , t is the weight of the arc from P to t, then the transition t is said to be enforceable;
(2)
The trigger of an enforceable transition t will result in the removal of W p , t tokens from each input place of t and the addition of W t , p tokens to each output place of t, where W t , p is the weight of the arc from t to P.
In the Petri Nets model, places are drawn in the form of circles, transitions are drawn as bars or boxes, and arcs are represented by arcs with arrows; a token is represented by a solid black dot. They are shown in Figure 2.
With the continuous study of Petri Nets, researchers have found that the classical PN has many defects. For example, without considering the time factor, the transition will be triggered as soon as the trigger condition is met, i.e., there is no delay, so the time-related performance metrics cannot be obtained. In addition, the scale of the model is easy to become very large, so it is difficult to reason and analyze the model. Therefore, to overcome these shortcomings and describe complex systems more conveniently, many high-level Petri Nets have emerged, including Colored Petri Nets (CPN), Time Petri Nets (TPN), Stochastic Petri Nets (SPN), and so on. Among them, SPN introduces the concept of time into traditional Petri Nets, which is well known for its capability and flexibility in modeling complex systems. Although the dynamic behavior of the model will be affected by the time parameter, the introduction of time reduces the state space and enhances the description ability of Petri Nets. Therefore, in this paper, SPN is used to analyze the performance of satellite networks.

2.2. Stochastic Petri Nets

Stochastic Petri Nets (SPN) [11] is extended by Molly on the basis of traditional Petri Nets. By introducing the concept of time, its description ability and solving efficiency are improved, and time-dependent performance metric measures can be obtained as well. Any real-time system can be modeled as a SPN process and can be analyzed by deriving the underlying Markov Chain [12].
Definition 2.
A Stochastic Petri Net is represented by a six-tuple, S P N = P , T , F , W , M 0 , λ ; among them, the meaning of P, T, F, W, M 0 is the same as that of traditional Petri Net, λ represents the set of average transition firing time rate, indicating the average number of implementations of the transition per unit time under the enforceable case, the average firing time rate corresponding to a transition t i , i.e., λ i . Here,
λ = { λ 1 λ 2 , . . . λ n }
SPN introduces a time delay τ i between the non-implementable and implementable of each transition, and the average time delay corresponding to a transition t i , i.e., τ i . Typically, the time delay is assumed to be a continuous random variable with exponential distribution, so it can be isomorphic to a Markov Chain (MC). Furthermore, using the theory of Markov Smooth Distribution, the performance analysis of the system modeled by SPN can be executed by solving the steady-state probability of each marking. This is also the principle of SPN for performance analysis.
The performance evaluation of a system using the SPN model is carried out in the following three steps:
  • Step1: Modeling the target system with SPN. This is the first step in conducting a performance evaluation, and the model depends on the concrete system you want to analyze.
  • Step2: Constructing the Markov Chain (MC) that is isomorphic to the SPN model.
  • Step3: Working on the system performance evaluation with the steady-state probability based on the MC. Specifically, we can use Markov’s theory to obtain the steady-state probabilities of each marking and then obtain the relevant parameters.
Here are some formulas to further get those parameters. They are as follows:
  • Token density function:
    P [ M ( P ) = i ] = j P ( M j ) T h e r e , M j [ M ( P ) = i ] , M j ( P ) = i
  • Average number of tokens on a place:
    u ¯ i = j × P [ M ( P i ) = j ]
  • Utilization rate of the transition:
    U ( t i ) = M E P ( M )
    There, E represents the set of all reachable markings that make t i enforceable.
  • Token velocity of the transition:
    R ( t i , P j ) = W ( t i , P j ) × U ( t i ) × λ i
On the basis of all the performance parameters mentioned above, we can do further research on the average time delay, throughput, and so on.

2.3. Active Defense Techniques

As a new technology against cyber attacks, active defense adopts a completely different defense idea from traditional defense techniques, and overcomes the shortcomings of traditional passive defense. Typical active defense technologies include End Hopping (EH), Moving Target Defense (MTD), Mimic Security Defense (MSD), and so on.
EH [6] technology was proposed by Shi in 2008. It refers to military frequency hopping communication countermeasure technology. In the end-to-end data transmission, both sides or one party of the communication pseudorandom change the port, IP address, time slot, protocol, and other End Information according to the agreement to realize the active network defense.
MTD [8] technology is a revolutionary “game-changing” technology in cyberspace proposed by Federal Networking and Information Technology Research and Development (NITRD) in 2011. Unlike prior efforts in cybersecurity research, MTD does not rely on increasing the complexity of the security system to achieve protection of the target. The core idea of MTD is to make the system dynamic, seeking to convert the fixed network into a flexible one, so as to raise the difficulty and cost for attackers and effectively restrict the vulnerabilities exposure and the opportunities for attack.
MSD [9] technology was proposed by Academician Wu in 2014 with reference to the way that mimicry octopus protects itself through morphological changes. The main idea is that, in addition to the service function and performance of the target object not being able to be hidden, the hardware and software of the system can be camouflaged by dynamic changes, so as to achieve the state that the system is controllable to the defender but unknown to the attacker, so as to achieve the purpose of active network defense to protect the system from attack.
According to the above statement, we can clearly know that unlike traditional passive defense methods, active defense techniques are dynamic, versatile, and unpredictable, and are therefore effective in countering direct attacks and interfering with enemy information interception. Among them, MTD is the most representative technology in the active defense system and is a key development direction in the field of future network security. Through the implementation of multi-level, dynamic, and continuous transfer of the attack surface of the protected system, the attacker will have to face as much uncertainty as the defender today, thus reducing the success rate of the intrusion into the system until the attacker is forced to give up the attack. Here, the attack surface can be understood as the set of system resources that can be exploited and attacked in the system. MTD is precisely through the defender to continuously change the resources on the attack surface to achieve changes in the attack surface, so as to confuse or mislead the attacker, prompting the attacker to lose the attack target. At present, the dynamic change technology of the attack surface mainly includes four categories: (1) dynamic change technology based on data attack surface [13]; (2) dynamic change technology based on software attack surface, mainly including instruction set randomization, code randomization [14], etc.; (3) dynamic change technology, based on the platform attack surface, mainly includes platform dynamic migration, virtualization techniques [15], etc.; (4) dynamic change technology based on network attack surface. The main idea is to introduce a dynamic change update mechanism. By collaboratively changing network IP addresses or ports, attackers are always unable to determine the real addresses of the communicating parties, thus undermining the sniffing attacks of attackers and achieving privacy protection for hosts. Among the above four types of attack surface dynamic change technology, the research on MTD based on the change of network attack surface is the most common and mature, and has been widely used.

3. Related Work

In recent years, the security of satellite networks has been one of the hot topics. With the popularity of new security technologies of active defense, people’s attention to satellite network security has started to shift from traditional protection technologies to active defense techniques.
The first is the network security situation awareness technology proposed by the academic circle, which aims to actively defend against network intrusion behavior and realize network security protection in advance. In [16], the authors introduced situational awareness technology into safety protection of the satellite, and put forward a situational awareness technology system for broadband satellite networks. This research provided support for satellite network security services and also improved the active defense capability of broadband satellite network infrastructure. In [17], the vulnerabilities of space network and the functions of active defense were analyzed, then a simulation implementation method of active defense modeling based on DTN (delay/disruption tolerant network) was proposed. The proposed method can analyze the performance of space network defense system in real time, effectively avoiding “zero-day attacks” and improving the active defense ability of the system. In [18], the authors presented an improved malicious code intrusion detection method for space information network, and the satellite system can achieve fast determination of malicious code attacks. The proposed method has the advantages of high detection rate, low satellite resource consumption, and low latency. In [19], the application design scheme of the endogenous security mechanism of the space-ground integrated information network based on MSD was proposed. This work provided a reference for the construction of a space network active defense security protection system.
Although scholars are gradually exploring the application of active defense technology in satellite communication networks, the related theoretical analysis has not been well studied, so the performance evaluation of satellite network based on active defense has become a necessary and urgent problem. Performance analysis is not only an important theoretical basis and supporting technology for system research, but also an important research direction in various fields. As a powerful analytical tool, PN has been used by scholars to conduct a lot of studies on performance analysis. In the rest of this section, we conduct a literature review on research work based on PNs.
Research on traditional computer network systems and security skills using PNs are very extensive. In [20], the authors presented an efficient Petri-net-based modeling technique for performance evaluation of application mapping. It could precisely represent the exclusion and pipelining of the communication path. The main advantage of this model is the consideration of parallelism of concurrent tasks and communication, as well as the exclusion of computation and communication with public resources. In [21], the authors developed a configurable CPN model for evaluating the performance and the effectiveness of the IEEE 802.11e protocol. Then, they used a CPN model to provide a comprehensive study of the effectiveness of this protocol. Their CPN model sets the basis for further exploring the performance of the various mechanisms defined by the IEEE 802.11 standard. The paper [22] established a performance analysis model based on SPN to evaluate the influence of honeypot on the performance of system. However, this study only stops at concluding whether it is worth deploying honeypots. The impact of honeypots on network performance deserves further study. In [23], a single server retrial queueing system with preemptive priority for modeling and analyzing spectrum occupancy in CR networks was proposed. They analyzed some performance metrics such as delays, throughput, queue length, number of customers in system, etc., via simulation with the help of STCPN (Stochastic Timed Colored Petri Nets). In [24], the authors applied P-Timed Petri Nets to conduct modeling and robustness research on the railway transportation system to evaluate the stability and efficiency of the railway transportation network. Ref. [25] used CPN to model and validate the secure interconnection between industrial control systems (ICS) and enterprise networks. A secure and effective interconnection model between ICS and enterprise networks is proposed, which can be applied to any interconnection environment. There are many other related studies, which will not be listed one by one here.
As for in the area of satellite networks, Petri Nets has been widely used as well, and have accumulated certain research results. Research on the field of satellite network based on PNs mainly include:
In [26], the authors applied Generalized Stochastic Petri Nets (GSPN) to the network control protocols of satellite communication system, and evaluated the reliability and performance of the protocols by verifying some key characteristics of the protocols. Ref. [27] proposed a consistency checking method based on Colored Petri Nets (CPN) to address the possible inconsistency between the protocol specification and the actual protocol execution status in satellite networks. In [28], authors established two Petri Net models to simulate the estimation of space debris flux of different sizes in satellite orbit and to study the impact of debris flux on satellite collision probability prediction, respectively. This is the first work, in our knowledge, to provide a model for a comprehensive evaluation of space debris flux and collision prediction of LEO satellites.
In [29], a navigation satellite availability analysis method based on CPN was proposed. Compared with the traditional availability analysis, this method comprehensively considers the failure factors and performance of the satellite, and is more in line with the actual situation. Ref. [30] proposed an effective reliability assessment algorithm for space information networks based on hopping surface nodes and Petri Nets. This work can guarantee the reliable transmission of data and improve the invulnerability of the network. In [31], the authors proposed a PNs-based method to evaluate the availability of a satellite constellation system. This study can provide guidance for the selection of optimal deployment and maintenance strategies. In [32], the authors simulated a satellite communication network control system based on CPN. When the satellite network communication failure occurs, the system can appropriately reduce the network performance and prevent data loss while maintaining the availability. In [33], the authors proposed a fault diagnosis prototype system of satellite remote control subsystem based on Petri Nets. Compared with the rule-based expert system method, this one can store knowledge in the mathematical matrix and reason more quickly and effectively.
In the field of performance analysis, Ref. [34] studied the data processing effectiveness evaluation of the satellite information application chain. By constructing a Petri Net model, core indicators such as average queue length and average waiting time were analyzed. This research provided support for the optimal allocation of resources in the satellite information application chain. In [35,36], the authors used SPN to construct performance analysis models for the message transmission process of two-layer and three-layer satellite network, respectively. However, the results were not very credible as only the average delay was selected as the network performance evaluation index. In [37], the authors proposed a SPN-based quantitative model for vulnerability, uncertainty, and probability (VUP) of satellite interactive networks. Then, the probability of the network at a given time and the vulnerability and uncertainty of the system under given conditions were calculated and analyzed. In [38], SPN performance evaluation models of the LEO satellite network in the case of single-user and dual-user were established separately. The authors concluded from the theoretical analysis that the satellite network under dual-users makes the average delay greater due to the presence of resource competition. Ref. [39] modeled each operating phase of the microsatellite system separately based on Time Petri Nets (TPN). This research work was very interesting, but unfortunately the results were not very exploitable.
To facilitate a quick overview of these research works, Table 1 summarizes the literature presented in this section.
In summary, researchers have performed a wide range of applications in protocol correctness verification, availability analysis, fault detection, and performance evaluation of satellite networks based on Petri Net. However, in terms of performance evaluation, the aforementioned works are almost focused on the satellite network itself, application protocols or its networking mode. As far as we know, there is no research on performance evaluation of satellite networks based on active defense, and there is a lack of theoretical guidance for the deployment of proactive security mechanisms. Consequently, in this paper, we propose a performance evaluation scheme of satellite network moving target defense system based on SPN.

4. SPN-Based Modeling and Performance Analysis

In this section, to investigate the impact of MTD on the performance of satellite networks, we give two satellite network communication scenarios based on conventional state and moving target defense state separately. Furthermore, we describe our proposed SPN models and demonstrate theoretical reasoning in detail.

4.1. Modeling and Analysis of Traditional Satellite Network with SPN

As shown in Figure 3, a typical satellite network communication system usually consists of two parts: the space segment and the ground segment.
The space segment consists of all satellites in the outer space of the Earth. The ground segment can be divided into two parts: the ground base station (including ground uplink station, ground receiving station, measurement and control station, etc.) and the user segment. The former is responsible for the communication access of user terminals in the communication service area, and undertakes the interface function between the satellite communication system and the terrestrial communication network (such as public telephone exchange network, public exchange data network, Internet). The user segment includes all kinds of user terminals (vehicle terminals, ship terminals, etc.) with communication needs. The communication satellite is the core of the entire system. Its main function is to act as a relay station connecting two or more terrestrial base stations, amplifying and relaying signals from terrestrial or other satellites, thus providing rich and colorful communication services with worldwide coverage and meeting the communication needs of users. The links connecting these devices are called communication links, including uplink, downlink, and inter-satellite link. In satellite communication, the link from the earth station to the satellite is an uplink, and, conversely, the link from the satellite to the earth station is a downlink. The inter-satellite link refers to the radio link connecting satellites. Its function is to connect individual satellites into a space-based network to realize the intercommunication between them, and thus enable the collection, processing, transmission, and distribution of information.
The typical communication process for satellite network is shown in Figure 4. More specifically, it can be described as follows:
  • The user terminal sends a service request to the satellite L1 through base station and waits for the service response;
  • Obtaining link bandwidth resources and L1 responds to the service request;
  • Sending data to L1 through the uplink;
  • L1 forwards the received data via the inter-satellite link to L2, which is responsible for the communication of user segment B;
  • L2 transmits data to B via the downlink, and finally completes the communication between A and B.
We use SPN to study the process by which messages are generated from users on the ground, then transmitted through the satellite network and finally returned to the ground. According to the above communication process and referring to the model in [38], we construct an SPN model of the traditional satellite network communication process, as shown in Figure 5.
The meaning of each place and transition in the SPN model above is listed in Table 2. We denote λ = { λ 2 , λ 3 , λ 6 , λ 7 , λ 8 } as the average transition firing time rate and τ = { τ 2 , τ 3 , τ 6 , τ 7 , τ 8 } as the average implementation delay. The average transition firing time rate and average implementation delay corresponding to each transition can be clearly found from Table 2.
According to the performance evaluation process in [40], the performance of the established SPN model can be analyzed by using Petri Nets theory and Markov theory. First, we can get the reachable marking set as M = { M 0 , M 1 , M 2 , M 3 , M 4 } of the traditional satellite network SPN model, as shown in Table 3.
Since the SPN reachable graph is isomorphic to a Continuous Time Markov Chain (CTMC), the isomorphic MC can be obtained by replacing each transition in the reachable graph with its corresponding average firing time rate as shown in Figure 6 [40]. The isomorphic MC contains five markings: M 0 (100001), M 1 (010001), M 2 (001001), M 3 (000100), M 4 (000010).
According to the definition of the transition matrix: Q = [ q i , j ], i n j n , there:
q i , j = λ k , t h e r a t e o n t h e a r c f r o m M i t o M j w h e n i j 0 , n o a r c f r o m M i t o M j w h e n i j k λ k , i = j
We can estimate the SPN model as follows, the transition matrix Q of the SPN model is:
Q = λ 2 λ 2 0 0 0 0 λ 3 λ 3 0 0 0 0 λ 6 λ 6 0 λ 2 0 0 λ 7 λ 7 λ 8 0 0 0 λ 8
We assume that P = ( p 0 , p 1 , p 2 , p 3 , p 4 ) , p i represents the steady-state probability of the Marking M i . According to Markovian Smooth Distribution theory, we have:
P × Q = 0 0 4 p i = 1
By solving the linear equation system from (6), the steady-state probability of each marking can be obtained as follows:
P ( M 0 ) = p 0 = λ 2 1 / ( λ 2 1 + λ 3 1 + λ 6 1 + λ 7 1 + λ 8 1 ) P ( M 1 ) = p 1 = λ 3 1 / ( λ 2 1 + λ 3 1 + λ 6 1 + λ 7 1 + λ 8 1 ) P ( M 2 ) = p 2 = λ 6 1 / ( λ 2 1 + λ 3 1 + λ 6 1 + λ 7 1 + λ 8 1 ) P ( M 3 ) = p 3 = λ 7 1 / ( λ 2 1 + λ 3 1 + λ 6 1 + λ 7 1 + λ 8 1 ) P ( M 4 ) = p 4 = λ 8 1 / ( λ 2 1 + λ 3 1 + λ 6 1 + λ 7 1 + λ 8 1 )
Furthermore, by applying the steady-state probabilities of markings and Formulas (1)–(4) in Section 2.2, the basic performance metrics such as token density function in each place, average number of tokens on a place, utilization rate of the transition, token velocity of the transition, etc. can be derived easily.
  • Token density function in each place is as follows:
    P ( M ( P r e a d y ) = 1 ) = P ( M 0 ) = p 0 P ( M ( P w a i t ) = 1 ) = P ( M 1 ) = p 1 P ( M ( P c o n n e c t ) = 1 ) = P ( M 2 ) = p 2 P ( M ( P r e c 1 ) = 1 ) = P ( M 3 ) = p 3 P ( M ( P r e c 2 ) = 1 ) = P ( M 4 ) = p 4 P ( M ( P b a n d ) = 1 ) = P ( M 0 ) + P ( M 1 ) + p ( M 2 ) = p 0 + p 1 + p 2
  • The average number of tokens on a place in the steady-state can be calculated as:
    u ¯ r e a d y = 1 × P ( M ( P r e a d y ) = 1 ) = p 0 u ¯ w a i t = 1 × P ( M ( P w a i t ) = 1 ) = p 1 u ¯ c o n n e c t = 1 × P ( M ( P c o n n e c t ) = 1 ) = p 2 u ¯ r e c 1 = 1 × P ( M ( P r e c 1 ) = 1 ) = p 3 u ¯ r e c 2 = 1 × P ( M ( P r e c 2 ) = 1 ) = p 4 u ¯ b a n d = 1 × P ( M ( P b a n d ) = 1 ) = p 0 + p 1 + p 2
    The average number of tokens contained in the set of all places from the time the service is requested by the user to the time it is completed is calculated as:
    N ¯ = u ¯ w a i t + u ¯ c o n n e c t + u ¯ r e c 1 + u ¯ r e c 2 + u ¯ b a n d = 1 + p 1 + p 2
  • The utilization rate of t r e q u e s t is:
    U ( t r e q u e e s t ) = P ( M 0 ) = p 0
  • The rate from t r e q u e s t to P w a i t is:
    R ( t r e q u e s t , P w a i t ) = W ( t r e q u e s t , P w a i t ) × U ( t r e q u e s t ) × λ 2 = λ 2 p 0
On the basis of all the performance parameters mentioned above, we can further calculate the average time delay by applying Little’s theorem and principle of balance [41], Little’s theorem is formulated as:
N ¯ = λ T
N ¯ represents the average queue length, λ denotes the average arrival rate, and T means average time delay of the queue. Consequently, the average time delay of the network is:
T = N ¯ / R ( t r e q u e s t , P w a i t ) = ( 1 + p 1 + p 2 ) / λ 2 p 0 = λ 2 1 + 2 λ 3 1 + 2 λ 6 1 + λ 7 1 + λ 8 1
The average throughput is defined as the average number of tasks completed by the system per unit of time, and it is an important indicator characterizing the performance of the system. The formula for calculating the throughput of each transition t in the steady-state is:
O ( t ) = M H P ( M ) × λ t
H is the set of markings that enable the implementation of transition t, and λ t is the average firing time rate of the transition t under marking M. The SPN model of satellite network communication completes one data communication service after the implementation of transition t t r a n s d o w n . Therefore, the average system throughput is:
O = P ( M 4 ) × λ 8 = λ 8 p 4 = 1 λ 2 1 + λ 3 1 + λ 6 1 + λ 7 1 + λ 8 1
Utilization of on-board bandwidth resources, which is used to measure the consumption of bandwidth resources on satellite networks, is calculated as:
U = P ( M ( P b a n d ) = 0 ) = p 3 + p 4 = λ 7 1 + λ 8 1 λ 2 1 + λ 3 1 + λ 6 1 + λ 7 1 + λ 8 1
Since the stochastic process used in the SPN model is a Poisson process, the occurrence of the transition satisfies the Poisson distribution, so the reciprocal of the average firing time rate of each transition in the model is its average implementation delay, i.e., τ i = 1 / λ i . To facilitate the analysis of the factors affecting each performance indicators, the following explanation is given: λ 2 1 denotes request delay τ 2 , λ 3 1 denotes waiting service delay τ 3 , λ 6 1 , λ 7 1 , and λ 8 1 denotes uplink propagation delay τ 6 , inter-satellite link propagation delay τ 7 , and downlink propagation delay τ 8 , respectively.
It can be seen that the average delay and throughput of satellite network communication process are closely related to the request duration, service latency, propagation delay of uplink, downlink, and inter-satellite link. The average network delay is the sum of each process delays, while the throughput rate is inversely proportional to this, which is consistent with the actual situation. As a result, in traditional satellite networks, accelerating service response, processing speed, and improving the transmission efficiency of the links between users and satellites can effectively reduce the average network delay, increase the throughput, and improve the network performance.

4.2. Modeling and Analysis of Active Defense-Based Satellite Network with SPN

From Section 2.3, we know that the research on MTD based on the change of network attack surface is the most common and mature. Therefore, this paper focuses on the modeling and analysis of the satellite network moving target defense system based on the change of network attack surface. The communication scenario is shown in Figure 7.
When there is a communication demand between two user segments A and B, the MTD-based satellite network communication process is as follows:
  • The ground user terminal in user segment A sends a synchronization authentication request to satellite L1 according to the established rules;
  • L1 responds to the user with authentication and turns on the synchronization service to ensure the legitimacy of the access entity and to resist spoofing by unauthorized users;
  • The authenticated trusted user terminal sends a service request to L1 and waits for the service response;
  • Both parties obtain link bandwidth resources and L1 responds to the service request;
  • Both parties switch to Moving Target Defense communication mode, and the client transmits data to L1 through the uplink. Whenever the current satellite service time slot ends, the service provider performs hopping (IP Address, Port) and data migration, then both parties continue the unfinished communication until this uplink message transmission is completed;
  • L1 forwards the received data via the inter-satellite link to satellite L2, which is responsible for the communication of user segment B;
  • L2 transmits the data to B via the downlink, thus completing the communication between A and B.
Based on the above analysis and the study in [42], the corresponding SPN model is obtained as shown in Figure 8. The meaning of each place and transition as well as the corresponding number of tokens is shown in Table 4. We denote λ = { λ 1 , λ 2 , λ 3 , λ 4 , λ 5 , λ 6 , λ 7 , λ 8 } as the average transition firing time rate and τ = { τ 1 , τ 2 , τ 3 , τ 4 , τ 5 , τ 6 , τ 7 , τ 8 } as the average implementation delay. From Table 4, we can see that the corresponding relationship between the transition and the above two parameters is consistent with those described in Section 4.1.
Compared with the model in Figure 5, the SPN model based on Moving Target Defense adds a synchronization place ( P s y n ) and a migration place ( P s w a p ). Different from the traditional satellite network communication process, the user needs to send a synchronous authentication request ( t s y n ) before the communication is established, and only after the authentication is successful can the connection, service, and other processes be carried out. During the service process, when the satellite time slot ( τ 4 ) of the current service is exhausted, service hopping, and data migration will be conducted, this process will consume additional bandwidth resources. After all the messages from client have been received for this communication, the uplink transmission ends and the system enters a new state P r e c 1 . Through analysis, we can easily get the reachable set of markings as shown in Table 5, and, furthermore, we can construct its isomorphic MC as shown in Figure 9.
The isomorphic MC contains seven markings: M 0 (10000001), M 1 (01000001), M 2 (00100001), M 3 (00010001), M 4 (00001000), M 5 (00000100), M 6 (00000010), the corresponding transition matrix Q of this SPN model is:
Q = λ 1 λ 1 0 0 0 0 0 0 λ 2 λ 2 0 0 0 0 0 0 λ 3 λ 3 0 0 0 0 0 0 λ 4 λ 6 λ 4 λ 6 0 0 0 0 λ 5 λ 5 0 0 0 0 0 0 0 λ 7 λ 7 λ 8 0 0 0 0 0 λ 8
Similarly, let P = ( p 0 , p 1 , p 2 , p 3 , p 4 , p 5 , p 6 ) be the row vector corresponding to the steady-state probability of each marking, and according to Equation (6), the steady-state probability of each marking is obtained as:
P ( M 0 ) = p 0 = λ 1 1 / ( λ 1 1 + λ 2 1 + λ 3 1 + λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 ) P ( M 1 ) = p 1 = λ 2 1 / ( λ 1 1 + λ 2 1 + λ 3 1 + λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 ) P ( M 2 ) = p 2 = λ 3 1 / ( λ 1 1 + λ 2 1 + λ 3 1 + λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 ) P ( M 3 ) = p 3 = λ 6 1 / ( λ 1 1 + λ 2 1 + λ 3 1 + λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 ) P ( M 4 ) = λ 5 1 λ 4 λ 6 1 / ( λ 1 1 + λ 2 1 + λ 3 1 + λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 ) P ( M 5 ) = p 5 = λ 7 1 / ( λ 1 1 + λ 2 1 + λ 3 1 + λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 ) P ( M 6 ) = p 6 = λ 8 1 / ( λ 1 1 + λ 2 1 + λ 3 1 + λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 )
  • Token density function in each place is as follows:
    P ( M ( P r e a d y ) = 1 ) = P ( M 0 ) = p 0 P ( M ( P s y n ) = 1 ) = P ( M 1 ) = p 1 P ( M ( P w a i t ) = 1 ) = P ( M 2 ) = p 2 P ( M ( P c o n n e c t ) = 1 ) = P ( M 3 ) = p 3 P ( M ( P s w a p ) = 1 ) = P ( M 4 ) = p 4 P ( M ( P r e c 1 ) = 1 ) = P ( M 5 ) = p 5 P ( M ( P r e c 2 ) = 1 ) = P ( M 6 ) = p 6 P ( M ( P b a n d ) = 1 ) = P ( M 0 ) + P ( M 1 ) + p ( M 2 ) + p ( M 3 ) = p 0 + p 1 + p 2 + p 3
  • The average number of tokens on a place in the steady-state can be calculated as:
    u ¯ r e a d y = p 0 ,   u ¯ s y n = p 1 u ¯ w a i t = p 2 ,   u ¯ c o n n e c t = p 3 u ¯ s w a p = p 4 ,   u ¯ r e c 1 = p 5 u ¯ r e c 2 = p 6 ,   u ¯ b a n d = p 0 + p 1 + p 2 + p 3
    The average number of tokens contained in the set of all places from the request made by the client to the completion of the service is calculated as:
    N ¯ = u ¯ w a i t + u ¯ s w a p + u ¯ c o n n e c t + u ¯ r e c 1 + u ¯ r e c 2 + u ¯ b a n d = 1 + p 1 + p 2 + p 3
  • The utilization rate of t r e q u e s t is:
    U ( t r e q u e e s t ) = P ( M 1 ) = p 1
  • The rate from t r e q u e s t to P w a i t is:
    R ( t r e q u e s t , P w a i t ) = W ( t r e q u e s t , P w a i t ) × U ( t r e q u e s t ) × λ 2 = λ 2 p 1
Therefore, the average latency of the satellite network security protection system based on the Moving Target Defense technique is:
T = N ¯ / R ( t r e q u e s t , P w a i t ) = λ 1 1 + λ 2 1 + 2 λ 3 1 + 2 λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1
Average throughput is:
O = P ( M 6 ) × λ 8 = λ 8 p 6 = 1 λ 1 1 + λ 2 1 + λ 3 1 + λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1
Utilization of on-board bandwidth resources is:
U = P ( M ( P b a n d ) = 0 ) = λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 λ 1 1 + λ 2 1 + λ 3 1 + λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1
λ 2 1 , λ 3 1 , λ 6 1 , λ 7 1 , λ 8 1 have the same meaning as described in Section 4.1, λ 1 1 denotes the synchronous authentication delay i.e., τ 1 , λ 4 1 denotes the single service hopping time slot i.e., τ 4 , and λ 5 1 denotes the data migration delay i.e., τ 5 .
From the theoretical reasoning results, we can see that the network time delay, throughput, and bandwidth utilization of the satellite network moving target defense system are not only related to the link transmission duration, request delay, and service delay, but also affected by synchronization delay, hopping rate, and data migration delay introduced by MTD strategy. Compared with traditional satellite networks, the MTD-based satellite network has the following relationship in terms of average delay, average throughput, and bandwidth utilization:
λ 1 1 + λ 2 1 + 2 λ 3 1 + 2 λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 λ 2 1 + 2 λ 3 1 + 2 λ 6 1 + λ 7 1 + λ 8 1 1 λ 1 1 + λ 2 1 + 2 λ 3 1 + 2 λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 1 λ 2 1 + 2 λ 3 1 + 2 λ 6 1 + λ 7 1 + λ 8 1 λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 λ 1 1 + λ 2 1 + 2 λ 3 1 + 2 λ 6 1 + λ 5 1 λ 4 λ 6 1 + λ 7 1 + λ 8 1 λ 7 1 + λ 8 1 λ 2 1 + 2 λ 3 1 + 2 λ 6 1 + λ 7 1 + λ 8 1
Consequently, the synchronous authentication technology, service hopping, and data migration introduced by MTD will reduce the overall performance of the satellite network, specifically, increase the average network latency, reduce the average throughput, and increase the consumption of bandwidth resources on the satellite network.

5. Model Simulation and Experiments

In order to verify the impact of MTD technology on satellite network performance, and to explore the variation of average delay, average throughput, and on-star bandwidth resource utilization with different parameters, in this section, simulations are performed for proposed models and a large number of experiments are carried out for the performance analysis work.
First, the two proposed SPN models are simulated separately based on PIPE (Platform Independent Petri Net Editor), one of the simulation tools for Petri Nets, which can draw Petri Net models, simulate the dynamic effects of Petri Nets, and can verify the correctness and usability of the models. The initial reference values of each model are set as shown in Table 6.
Figure 10 and Figure 11 show the reachable graphs obtained from the simulation of the two SPN models, respectively. By replacing each transition with its corresponding average firing time rate, the same isomorphic Markov Chain as in the theoretical analysis can be obtained, as shown in Figure 6 and Figure 9, where S i corresponds to M i , thus verifying the correctness of the theoretical inference results. Furthermore, based on the initial parameter values in Table 6, the simulation results of the steady-state probabilities of each marking are shown in Table 7.
We use the data obtained from the above simulations and the formulas in Section 4 to calculate the average delay T, average throughput O, and bandwidth utilization U of the network under each scenario. The results are shown in Table 8.
We can see from Table 8 that the introduction of the MTD mechanism has led to a decline in the performance of the satellite network system, which is consistent with the theoretical reasoning results. More specifically, the average delay and bandwidth resource utilization have increased by 17% and 23%, respectively, while the average throughput of the system has decreased by about 20%. To illustrate the influence relationship of parameters on the selected three performance metrics more clearly and quantitatively, further experiments are conducted by varying values of parameters.
Experiment 1.
With the other parameters fixed, the changes of the average delay of the whole network with the increase of synchronization rate, hopping rate, and migration efficiency are investigated, respectively. The results are shown in Figure 12. The horizontal coordinate represents the change rate, and the vertical coordinate represents the average delay.
Experiment 2.
Under the condition of Experiment 1, the variation of the average throughput of the whole network is examined. The results are shown in Figure 13, where the horizontal coordinate represents the rate of change and the vertical coordinate stands for the average throughput.
From Figure 12 and Figure 13, we can see that the average delay and average throughput of the network vary drastically with the hopping rate, while the synchronization rate and the data migration efficiency have little effect on them. As the hopping rate increases, the average network throughput decreases significantly, while the latency increases significantly. Since the hopping rate, synchronization rate, and migration efficiency depend on the specific hopping strategy, synchronization technique and migration scheme, respectively, the hopping strategy plays an important role in delay and throughput. Good synchronization authentication and data migration scheme imply higher synchronization and migration efficiency. Therefore, designing and implementing an efficient synchronization strategy and migration scheme can really improve the latency and average throughput reduction brought by MTD technology to some extent.
Experiment 3.
Under the conditions of Experiment 1, the change in bandwidth resource utilization of the whole network is investigated, and the results are shown in Figure 14, where the horizontal coordinate represents the rate of change, and the vertical coordinate represents the bandwidth utilization.
As shown in Figure 14, hopping rate continues to be the main factor affecting the consumption of bandwidth resources. As the hopping rate increases, the bandwidth utilization of the network link also grows. The reasons for this phenomenon can be explained as follows: faster hopping speed, shorter duration of single service, and more frequent data migration, which consumes bandwidth resources additionally. Thus, the competition between normal business and data migration to use network bandwidth makes the consumption of bandwidth resources more apparent. The increase in migration efficiency can reduce the utilization of bandwidth, so an efficient data migration scheme will go some way to alleviating the consumption of bandwidth resources caused by high-speed hopping.
Finally, one more work has been done to illustrate the superiority of our scheme. In the field of performance evaluation, the three most representative mathematical theoretical analysis methods are Queueing Theory, Markov Process, and Petri Nets. We made a horizontal comparison between our method and the work in [43,44]. Results are shown in Table 9.
We can see that the performance analysis method we use has excellent performance in terms of descriptive, modeling, and characterization capabilities. Queueing Theory in [43] has limitations in modeling relatively complex structures and cannot portray the parallel, asynchronous, and distributed characteristics of information operations. The Markov Process of [44] performs slightly worse in modeling and has difficulty in modeling the corresponding stochastic process level.
Summary: the deployment and implementation of MTD mechanism in satellite networks can effectively improve the security of the network on the one hand. On the other hand, it also brings performance loss. Hopping rate is the key factor influencing network performance. Extending to the category of active defense technology, which is typically characterized by “proactive change,” a high frequency of change is required to keep the system dynamic and defensive. Therefore, to deploy active defense technology in the special environment of satellite networks, the setting of change frequency is the key bottleneck, and it is necessary to comprehensively consider the network environment and security requirements in practical applications, so as to obtain availability–security–overhead balance. In addition, it is crucial to study efficient satellite-ground synchronization authentication technology and data migration scheme, and to improve the transmission efficiency of satellite-ground and inter-satellite links, and to improve the service response as well as satellite processing business capacity, in order to reduce the impact of active protection technology on network performance and to achieve low overhead processing capability of satellite networks.

6. Discussion

With the gradual application of active defense technologies on satellite networks, it is particularly necessary to study their impact on network performance. Since it is too costly to study satellite networks by physical experiments, a mathematical approach to modeling and evaluating their performance is a proven research method. In this paper, a new scheme is provided for evaluating the performance of satellite network moving target defense system using SPN. Based on the advantages of SPN’s powerful mathematical model simulation and graphical modeling, the network model is established visually and intuitively, and some instructive conclusions are drawn through theoretical reasoning and experimental analysis. Nevertheless, there are still some issues and limitations that need to be considered and understood:
  • MTD technology has a more complex and extensive defense scheme, and the scheme studied in the paper based only on the change of the network attack surface, which is still simple and general, and cannot fully reflect the impact of the application of moving target defense technology on the network.
  • When the problems studied and the network structure involved are more complex, modeling with Stochastic Petri Nets is prone to state space explosion, low efficiency, and complex calculation.
In future work, we can further model and analyze the satellite network moving target defense system based on the change of three other attack surfaces (i.e., data, software, platform), and optimize the configuration of defense techniques based on the research results, so as to provide more comprehensive guidance for satellite network system security protection.

7. Conclusions

This paper focuses on the performance evaluation of satellite networks with active defense technology. SPN is used to build performance evaluation models of satellite networks. Then, we theoretically inferred and analyzed the proposed SPN models. After that, we conduct extensive simulations on the PIPE platform, and the influence of different parameters of the active defense technique on the performance of the whole satellite network is evaluated.
The conclusions are as follows: the deployment of MTD technology reduces the overall performance of the satellite network. Change frequency is the key factor to the performance loss and security of the entire satellite network. To maintain the balance of performance-security, the trade-off between communication performance and change frequency will be one of the main points of research on active defense technology. Improving synchronization and migration efficiency, link anti-interference, and transmission capacity, as well as satellite processing service capacity can effectively alleviate this problem. The results we get can be used for further improvement of active defense technologies, as well as for the design and optimization of satellite network moving target defense systems.

Author Contributions

All authors contributed to the development and completion of this paper. Conceptualization and project administration, L.S.; Methodology validation, formal analysis, and writing—original draft preparation, S.D.; writing—review and editing, Y.M.; visualization, S.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Shandong Provincial Natural Science Foundation under Project ZR2019MF034, in part by the Research Funds from Guangxi Key Laboratory of Cryptography and Information Security under Grant GCIS201811, in part by the National Natural Science Foundation of China (NSFC) under Grant No. 61772551.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

All data included in this study are available upon request by contact with the corresponding author.

Acknowledgments

The authors thank anonymous reviewers who gave valuable suggestions and useful comments, which will greatly improve the manuscript. The authors would also like to acknowledge the cooperation and invaluable assistance of the whole research team throughout the preparation of the original manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MTDMoving Target Defense
PNPetri Nets
SPNStochastic Petri Nets
MCMarkov Chain
PIPEPlatform Independent Petri Net Editor
GEOGeostationary Earth Orbit
EHEnd Hopping
MSDMimic Security Defense
TPNTime Petri Nets
CPNColored Petri Nets
NITRDNetworking and Information Technology Research and Development
DTNDelay/Disruption Tolerant Network
CRCognitive Radio
STCPNTimed Stochastic Colored Petri Nets
ICSIndustrial Control System
GSPNGeneralized Stochastic Petri Nets
PTPNP-Timed Petri Nets
VUPVulnerability, Uncertainty, and Probability
LEOLow Earth Orbit
CTMCContinuous Time Markov Chain

References

  1. Xia, K. Satellite Communications; Xidian University Press: Xi’an, China, 2018. [Google Scholar]
  2. Yi, K.; Li, Y.; Sun, C.; Nan, C. Recent development and its prospect of satellite communications. J. Commun. 2015, 36, 157–172. [Google Scholar]
  3. Xie, X.; Wang, J.; Guo, X.; Wu, X. Performance evaluation of ad-hoc routing protocols in hybrid MANET-satellite network. In International Conference on Machine Learning and Intelligent Communications; Springer: Cham, Switzerland, 2018; pp. 500–509. [Google Scholar]
  4. Li, F.; Yin, L.; Wu, W.; Zhang, L.; Shi, G. Research status and development trends of security assurance for space-ground integration information network. J. Commun. 2016, 37, 156–168. [Google Scholar]
  5. An, K.; Lin, M.; Ouyang, J.; Zhu, W.P. Secure Transmission in Cognitive Satellite Terrestrial Networks. IEEE J. Sel. Areas Commun. 2016, 34, 3025–3037. [Google Scholar] [CrossRef]
  6. Shi, L.; Jia, C.; Lv, S. Research on end hopping for active network confrontation. J. Commun. 2008, 29, 106–110. [Google Scholar]
  7. Shi, L.; Guo, H.; Wen, X.; Li, J.; Cui, Y.; Ma, M.; Sun, H. Research on end hopping and spreading for active cyber defense. J. Commun. 2019, 40, 129–139. [Google Scholar]
  8. Carvalho, M.; Ford, R. Moving-Target Defenses for Computer Networks. IEEE Secur. Priv. 2014, 12, 73–76. [Google Scholar] [CrossRef]
  9. Hu, H.; Wu, J.; Wang, Z.; Cheng, G. Mimic defense: A designed-in cybersecurity defense framework. IET Inf. Secur. 2018, 12, 226–237. [Google Scholar] [CrossRef]
  10. Murata, T. Petri nets: Properties, analysis and applications. Proc IEEE 2010, 77, 541–580. [Google Scholar]
  11. Molloy, M.K. Performance analysis using stochastic Petri nets. IEEE Comput. Archit. Lett. 1982, 31, 913–917. [Google Scholar] [CrossRef]
  12. Shailesh, T.; Nayak, A.; Prasad, D. A study on performance evaluation of computer systems using Petri Nets. In Proceedings of the 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS), Belgaum, India, 21–22 December 2018; pp. 18–23. [Google Scholar]
  13. Nguyen-Tuong, A.; Evans, D.; Knight, J.C.; Cox, B.; Davidson, J.W. Security through redundant data diversity. In Proceedings of the 2008 IEEE International Conference on Dependable Systems and Networks with FTCS and DCC (DSN), Anchorage, AK, USA, 24–27 June 2008; pp. 187–196. [Google Scholar]
  14. Chen, X.; Bos, H.; Giuffrida, C. CodeArmor: Virtualizing the Code Space to Counter Disclosure Attacks. In Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroS & P), Paris, France, 26–28 April 2017; pp. 514–529. [Google Scholar]
  15. Homed, O.; Adam, C.; Robinson, E.; Haines, J. Creating a Cyber Moving Target for Critical Infrastructure Applications using platform diversity. Int. J. Crit. Infrastruct. Prot. 2012, 5, 30–39. [Google Scholar]
  16. Dong, K.; Zhang, H.; Liu, Y.; Li, Y. Research on Security situation Awareness Technology of Broadband Satellite Network. In Seminar on “Network Security Technology and Application Innovation” in 2020; Netinfo Security: Shanghai, China, 2020; pp. 98–101. [Google Scholar]
  17. Hu, S.; Meng, X.; Jiang, L. Supporting techniques of proactive self-defense for cyberspace war with integrated space-ground network system. Guizhou Sci. 2010, 29, 59–62. [Google Scholar]
  18. She, C.; Ma, Y.; Wang, J. An improved malicious code intrusion detection method based on target tree for space information network. Int. J. Distrib. Sens. Netw. 2017, 13, 1–10. [Google Scholar] [CrossRef] [Green Version]
  19. Ji, X.; Liang, H.; Hongchao, H. New thoughts on security technologies for space-ground integration information network. Telecommun. Sci. 2017, 33, 24–35. [Google Scholar]
  20. Raeisi-Varzaneh, M.; Sabaghian-Bidgoli, H. A Petri-net-based communication-aware modeling for performance evaluation of NOC application mapping. J. Supercomput. 2020, 76, 9246–9269. [Google Scholar] [CrossRef]
  21. Coronado, E.; Valero, V.; Orozco-Barbosa, L.; Cambronero, M.E.; Pelayo, F.L. Modeling and simulation of the IEEE 802.11e wireless protocol with hidden nodes using Colored Petri Nets. Softw. Syst. Model. 2020. [Google Scholar] [CrossRef]
  22. Shi, L.; Li, Y.; Feng, H. Performance analysis of honeypot with petri nets. Information 2018, 9, 245. [Google Scholar] [CrossRef] [Green Version]
  23. Boukredera, D.; Adel-Aissanou, K. Modeling and Performance Analysis of Cognitive Radio Networks Using Stochastic Timed Colored Petri Nets. Wirel. Pers. Commun. 2020, 112, 1659–1687. [Google Scholar] [CrossRef]
  24. Mhalla, A.; Gaied, M. Modeling and Robustness Study of Railway Transport Networks Using P-Timed Petri Nets. J. Eng. 2018, 2018, 1–12. [Google Scholar] [CrossRef] [Green Version]
  25. Borrego, A.; Guelfi, A.E.; Silva, A.A.A.D.; Azevedo, M.T.D.; Kofuji, S.T. Modeling and Validating a Secure Interconnection between Industrial Control System and Corporate Network using Colored Petri Net. Colloq. Exactarum 2020, 12, 45–61. [Google Scholar] [CrossRef]
  26. Zhu, J.; Yang, Q.; Huang, W.; Lu, R. A formal model of satellite communication system network control protocol based on generalized stochastic Petri nets. In Proceedings of the 2015 IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, 10–11 October 2015; pp. 340–346. [Google Scholar]
  27. Zhu, J.; Wei, P.; Xie, S.; Lu, R. A dynamic conformance checking method based on petri nets for satellite communication system network control protocol. In Proceedings of the International Conference on Wireless Communications, Yangzhou, China, 13–15 October 2016. [Google Scholar]
  28. Torky, M.; Hassanein, A.E.; Fiky, A.H.E.; Alsbou, Y. Analyzing Space Debris Flux and Predicting Satellites Collision Probability in LEO Orbits Based on Petri Nets. IEEE Access 2019, 7, 83461–83473. [Google Scholar] [CrossRef]
  29. Li, H.; Zheng, H.; Zhao, H.; Zheng, Z. Research on the Availability Analysis Method of Navigation Satellite Based on Petri Nets. In China Satellite Navigation Conference (CSNC) 2018 Proceedings; Springer: Singapore, 2018; pp. 127–136. [Google Scholar]
  30. Zhang, L.; Zhao, L.; Jiang, Y.; Wang, Q.; Shang, J. Reliability Evaluation of Space Information Network Based on Petri Net Jump Surface Nodes. Control Eng. China 2016, 23, 66–72. [Google Scholar]
  31. Ereau, J.; Saleman, M. Modeling and simulation of a satellite constellation based on Petri nets. In Proceedings of the IEEE 1996 Annual Reliability and Maintainability Symposium, Las Vegas, NV, USA, 22–25 January 1996; pp. 66–72. [Google Scholar]
  32. Einafshar, A.; Razavi, B.; Sassani, F. Integrated Reconfiguration of Multi-Satellite Network Communication Using Colored Petri Nets. In Integrated Systems: Innovations and Applications; Springer: Cham, Switzerland, 2015; pp. 3–28. [Google Scholar]
  33. Ding, C. Application of Petri net to fault diagnosis in satellite. J. Syst. Eng. Electron. 2001, 12, 92–96. [Google Scholar]
  34. Meng, J.; Xu, P.; Wu, G. Performance Evaluation of Data Processing for Satellite Information Application Chain Based on Petri Net. J. Comput. Simul. 2017, 34, 185–189. [Google Scholar]
  35. Wu, F.; Sun, F.; Sun, Z. Performance Analysis of a Double-Layered Satellite Network. J. Comput. Res. Dev. 2005, 42, 259–265. [Google Scholar] [CrossRef]
  36. Hong, Z.; Fan, Z. A Petri Net-Based Performance Analysis of a Triple-Layered LEO/MEO/GEO Satellite Network. Acta Electron. Sin. 2005, 33, 354–357. [Google Scholar]
  37. Einafshar, A.; Sassani, F. Vulnerability, Uncertainty and Probability (VUP) Quantification of a Network of Interacting Satellites Using Stochastic Petri Nets (SPN). In Proceedings of the Asme 2013 International Mechanical Engineering Congress and Exposition, San Diego, CA, USA, 15–21 November 2013; American Society of Mechanical Engineers Digital Collection: New York, NY, USA, 2013; pp. 15–21. [Google Scholar]
  38. Zeng, W.; Hong, Z. SPN-based performance analysis of LEO satellite networks with multiple users. In Proceedings of the IEEE 2011 International Conference on Machine Learning and Cybernetics, Guilin, China, 10–13 July 2011; pp. 1425–1429. [Google Scholar]
  39. Kumar, V.S.; Srinivasan, R.; Amaresh, N.; Vaidehi, V. Modeling of Various Phases of Micro Satellite using Timed Petri Nets. In Proceedings of the IEEE 2007 International Conference on Signal Processing, Communications and Networking, Chennai, India, 22–24 February 2007; pp. 195–198. [Google Scholar]
  40. Lin, C. Stochastic Petri Net and System Performance Evaluation; Tsinghua University Press: Beijing, China, 2005. [Google Scholar]
  41. Trivedi, K.S. Probability and Statistics with Reliability, Queuing, and Computer Science Applications; John Wiley & Sons: Hoboken, NJ, USA, 2016. [Google Scholar]
  42. Shi, L.; Jia, C.; Lv, S. Performance Evaluation for Service Hopping System Using Stochastic Petri Net. Acta Sci. Nat. Universiatis Nankaiensis 2009, 43, 72–75. [Google Scholar]
  43. Okada, H.; Kusumoto, H.; Kobayashi, K.; Katayama, M. An Approach from Queueing Theory for Wireless Distributed Networks: Performance Analysis of Single-User/Multi-User MIMO Wireless Networks. J. Med. Food 2013, 13, 905–910. [Google Scholar]
  44. Shi, Z.; Zhu, Q. Performance Analysis and Optimization Based on Markov Process for Heterogeneous Wireless Networks. J. Electron. Inf. Technol. 2012, 34, 2224–2229. [Google Scholar] [CrossRef]
Figure 1. Wide application of satellite networks.
Figure 1. Wide application of satellite networks.
Remotesensing 13 01262 g001
Figure 2. Model elements of Petri Nets.
Figure 2. Model elements of Petri Nets.
Remotesensing 13 01262 g002
Figure 3. The composition of the satellite communication system.
Figure 3. The composition of the satellite communication system.
Remotesensing 13 01262 g003
Figure 4. Communication process for the satellite network.
Figure 4. Communication process for the satellite network.
Remotesensing 13 01262 g004
Figure 5. SPN model for the traditional satellite network.
Figure 5. SPN model for the traditional satellite network.
Remotesensing 13 01262 g005
Figure 6. Isomorphic Markov chain.
Figure 6. Isomorphic Markov chain.
Remotesensing 13 01262 g006
Figure 7. Communication scenario for the satellite network security protection system based on Moving Target Defense.
Figure 7. Communication scenario for the satellite network security protection system based on Moving Target Defense.
Remotesensing 13 01262 g007
Figure 8. SPN model for satellite networks based on Moving Target Defense.
Figure 8. SPN model for satellite networks based on Moving Target Defense.
Remotesensing 13 01262 g008
Figure 9. Isomorphic Markov chain.
Figure 9. Isomorphic Markov chain.
Remotesensing 13 01262 g009
Figure 10. Reachability diagram of SPN model 1.
Figure 10. Reachability diagram of SPN model 1.
Remotesensing 13 01262 g010
Figure 11. Reachability diagram of SPN model 2.
Figure 11. Reachability diagram of SPN model 2.
Remotesensing 13 01262 g011
Figure 12. Effect of change rate on Average Time Delay.
Figure 12. Effect of change rate on Average Time Delay.
Remotesensing 13 01262 g012
Figure 13. Effect of change rate on Average Throughput.
Figure 13. Effect of change rate on Average Throughput.
Remotesensing 13 01262 g013
Figure 14. Effect of change rate on utilization of bandwidth.
Figure 14. Effect of change rate on utilization of bandwidth.
Remotesensing 13 01262 g014
Table 1. Summary of research literature based on Petri Nets.
Table 1. Summary of research literature based on Petri Nets.
Research FieldReferenceMethodContent
Traditional NetworkRef. [20]PNApplication mapping assessment
Ref. [21]CPNEvaluation of IEEE802.11e protocol
Ref. [22]SPNPerformance evaluation of Honeypot technology
Ref. [23]STCPNModeling of CR networks
Ref. [24]PTPNRobustness research on railway transportation
Ref. [25]CPNNetwork security interconnection verification
Protocol Correctness VerificationRef. [26]GSPNEvaluate the reliability and performance of the protocols
Ref. [27]CPNProtocol consistency check
Ref. [28]PNLEO satellite collision prediction
Availability AnalysisRef. [29]CPNNavigation satellite availability analysis
Ref. [30]PNReliability assessment
Ref. [31]PNSatellite constellation system availability analysis
Fault DetectionRef. [32]CPNSimulation of satellite communication network control system
Ref. [33]PNFault diagnosis of satellite remote control subsystem
Performance EvaluationRef. [34]PNData processing effectiveness evaluation of satellite information application chain
Ref. [35]SPNTwo-layer satellite network performance analysis
Ref. [36]SPNThree-layer satellite network performance analysis
Ref. [37]SPNCalculation of vulnerability and uncertainty
Ref. [38]SPNPerformance comparison between single user and dual user
Ref. [39]TPNModeling of microsatellite system
Table 2. List of SPN objects in Figure 5.
Table 2. List of SPN objects in Figure 5.
Place/TransitionMarking/RateMeaning
P r e a d y 1Ready
P w a i t 0Waiting for transmission link
P c o n n e c t 0Communication/Connection
P r e c 1 0Message arriving to satellite L1
P r e c 2 0Message arriving to satellite L2
P b a n d 1On-Star Bandwidth Resources
t r e q u e s t λ 2 Requesting service
t s t a r t λ 3 Starting service
t t r a n s u p λ 6 Transmitting message from ground to satellite L1 via uplink
t t r a n s 12 λ 7 Transmitting message from L1 to L2 via inter-satellite link
t t r a n s d o w n λ 8 Transmitting message from L2 to ground via downlink
Table 3. Reachable marking set of the SPN model.
Table 3. Reachable marking set of the SPN model.
P r e a d y P w a i t P c o n n e c t P r e c 1 P r e c 2 P b a n d
M 0 100001
M 1 010001
M 2 001001
M 3 000100
M 4 000010
Table 4. List of SPN objects in Figure 8.
Table 4. List of SPN objects in Figure 8.
Place/TransitionMarking/RateMeaning
P r e a d y 1Ready
P s y n 0Synchronization
P w a i t 0Waiting for transmission link
P c o n n e c t 0Communication/Connection
P s w a p 0Migration / Service switching
P r e c 1 0Message arriving to satellite L1
P r e c 2 0Message arriving to satellite L2
P b a n d 1On-Star Bandwidth Resources
t s y n λ 1 Requesting synchronization
t r e q u e s t λ 2 Requesting service
t s t a r t λ 3 Starting service
t s t a r t s w a p λ 4 Staring swap
t e n d s w a p λ 5 Ending swap
t t r a n s u p λ 6 Transmitting message from ground to satellite L1 via uplink
t t r a n s 12 λ 7 Transmitting message from L1 to L2 via inter-satellite link
t t r a n s d o w n λ 8 Transmitting message from L2 to ground via downlink
Table 5. Reachable marking set of the SPN model.
Table 5. Reachable marking set of the SPN model.
P r e a d y P s y n P w a i t P c o n n e c t P s w a p P r e c 1 P r e c 2 P b a n d
M 0 10000001
M 1 01000001
M 2 00100001
M 3 00010001
M 4 00001000
M 5 00000100
M 6 00000010
Table 6. Initial parameters’ values.
Table 6. Initial parameters’ values.
ParametersValuesParametersValues
λ 1 2 λ 5 2
λ 2 1 λ 6 0.6
λ 3 0.4 λ 7 0.8
λ 4 2 λ 8 0.6
Table 7. Steady-state probabilities of each marking.
Table 7. Steady-state probabilities of each marking.
Steady-State ProbabilitiesSPN Model 1SPN Model 2
P ( M 0 ) 0.123710.04878
P ( M 1 ) 0.309280.09756
P ( M 2 ) 0.206190.2439
P ( M 3 ) 0.154640.1626
P ( M 4 ) 0.206190.1626
P ( M 5 ) 0.12195
P ( M 6 ) 0.1626
Table 8. Results of performance indicators.
Table 8. Results of performance indicators.
IndicatorsSPN Model 1SPN Model 2
T (Average Time Delay)12.25014.417
O (Average Throughput)0.1240.098
U (Utilization of Bandwidth)0.3610.447
Table 9. Comparison of features of different performance evaluation schemes.
Table 9. Comparison of features of different performance evaluation schemes.
FeatureReference [43]Reference [44]This Paper
Description abilityMediumStrongStrong
Modeling abilityMediumMediumStrong
Portrayal abilityMediumStrongStrong
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Shi, L.; Du, S.; Miao, Y.; Lan, S. Modeling and Performance Analysis of Satellite Network Moving Target Defense System with Petri Nets. Remote Sens. 2021, 13, 1262. https://doi.org/10.3390/rs13071262

AMA Style

Shi L, Du S, Miao Y, Lan S. Modeling and Performance Analysis of Satellite Network Moving Target Defense System with Petri Nets. Remote Sensing. 2021; 13(7):1262. https://doi.org/10.3390/rs13071262

Chicago/Turabian Style

Shi, Leyi, Shanshan Du, Yifan Miao, and Songbai Lan. 2021. "Modeling and Performance Analysis of Satellite Network Moving Target Defense System with Petri Nets" Remote Sensing 13, no. 7: 1262. https://doi.org/10.3390/rs13071262

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop