Next Article in Journal
Optimal Transfer of Entanglement in Oscillator Chains in Non-Markovian Open Systems
Previous Article in Journal
IE-MAS: Internal–External Multi-Agent Steering for Controllable Image Captioning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Resisting Memorization-Based APT Attacks Under Incomplete Information in DDHR Architecture: An Entropy-Heterogeneity-Aware RL-Based Scheduling Approach

1
Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing 100044, China
2
Institute of Computing Technology, China Academy of Railway Sciences Corporation Limited, Beijing 100081, China
3
The First Research Institution of Ministry of Public Security, Beijing 100006, China
*
Authors to whom correspondence should be addressed.
Entropy 2025, 27(12), 1238; https://doi.org/10.3390/e27121238
Submission received: 31 October 2025 / Revised: 2 December 2025 / Accepted: 5 December 2025 / Published: 7 December 2025
(This article belongs to the Section Multidisciplinary Applications)

Abstract

The rapid advancement of artificial technology is giving rise to new forms of cyber threats like memorization-based APT attacks, which not only pose significant risks to critical infrastructure but also present serious challenges to conventional security architectures. As a crucial service information system in railway passenger stations, the Railway Passenger Service System (RPSS) is particularly vulnerable due to its widespread terminal distribution and large attack surface. This paper focuses on two key challenges within the RPSS Cloud Center’s Double-Layer Dynamic Heterogeneous Redundancy (DDHR) architecture under such attacks: (i) the inability to accurately estimate redundant executor scheduling time, and (ii) the absence of an intelligent defense scheduling method capable of countering memorization-based attacks within a unified and quantifiable environment. To address these issues, we first establish the problem formulation of optimizing defender’s payoff under incomplete information, which applies information entropy of DDHR redundant executors to reflect attacking and defending behaviors. Then a method of estimating attacking time is proposed in order to overcome the difficulty in determining scheduling time due to incomplete information. Finally, we introduce the PPO_HE approach—a Proximal Policy Optimization (PPO) algorithm enhanced with quantifiable information Entropy and Heterogeneity of DDHR redundant executors. Extensive experiments were conducted for evaluation in terms of the two entropy-related metrics: information entropy decay amount and information entropy decay rate. Results demonstrate that the PPO_EH approach achieves the highest efficiency per scheduling operation in countering attacks and provides the longest resistance time against memorization-based attacks under identical initial information entropy conditions.
Keywords: DHR architecture; entropy; FlipIt game; mimic defense; reinforcement learning DHR architecture; entropy; FlipIt game; mimic defense; reinforcement learning

Share and Cite

MDPI and ACS Style

Wu, X.; Wang, M.; Chang, X.; Li, C.; Wang, Y.; Liang, B.; Deng, S. Resisting Memorization-Based APT Attacks Under Incomplete Information in DDHR Architecture: An Entropy-Heterogeneity-Aware RL-Based Scheduling Approach. Entropy 2025, 27, 1238. https://doi.org/10.3390/e27121238

AMA Style

Wu X, Wang M, Chang X, Li C, Wang Y, Liang B, Deng S. Resisting Memorization-Based APT Attacks Under Incomplete Information in DDHR Architecture: An Entropy-Heterogeneity-Aware RL-Based Scheduling Approach. Entropy. 2025; 27(12):1238. https://doi.org/10.3390/e27121238

Chicago/Turabian Style

Wu, Xinghua, Mingzhe Wang, Xiaolin Chang, Chao Li, Yixiang Wang, Bo Liang, and Shengjiang Deng. 2025. "Resisting Memorization-Based APT Attacks Under Incomplete Information in DDHR Architecture: An Entropy-Heterogeneity-Aware RL-Based Scheduling Approach" Entropy 27, no. 12: 1238. https://doi.org/10.3390/e27121238

APA Style

Wu, X., Wang, M., Chang, X., Li, C., Wang, Y., Liang, B., & Deng, S. (2025). Resisting Memorization-Based APT Attacks Under Incomplete Information in DDHR Architecture: An Entropy-Heterogeneity-Aware RL-Based Scheduling Approach. Entropy, 27(12), 1238. https://doi.org/10.3390/e27121238

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop