moving target defense
Recently Published Documents


TOTAL DOCUMENTS

346
(FIVE YEARS 176)

H-INDEX

21
(FIVE YEARS 8)

2022 ◽  
Vol 22 (1) ◽  
pp. 1-31
Author(s):  
Mengmeng Ge ◽  
Jin-Hee Cho ◽  
Dongseong Kim ◽  
Gaurav Dixit ◽  
Ing-Ray Chen

Resource constrained Internet-of-Things (IoT) devices are highly likely to be compromised by attackers, because strong security protections may not be suitable to be deployed. This requires an alternative approach to protect vulnerable components in IoT networks. In this article, we propose an integrated defense technique to achieve intrusion prevention by leveraging cyberdeception (i.e., a decoy system) and moving target defense (i.e., network topology shuffling). We evaluate the effectiveness and efficiency of our proposed technique analytically based on a graphical security model in a software-defined networking (SDN)-based IoT network. We develop four strategies (i.e., fixed/random and adaptive/hybrid) to address “when” to perform network topology shuffling and three strategies (i.e., genetic algorithm/decoy attack path-based optimization/random) to address “how” to perform network topology shuffling on a decoy-populated IoT network, and we analyze which strategy can best achieve a system goal, such as prolonging the system lifetime, maximizing deception effectiveness, maximizing service availability, or minimizing defense cost. We demonstrated that a software-defined IoT network running our intrusion prevention technique at the optimal parameter setting prolongs system lifetime, increases attack complexity of compromising critical nodes, and maintains superior service availability compared with a counterpart IoT network without running our intrusion prevention technique. Further, when given a single goal or a multi-objective goal (e.g., maximizing the system lifetime and service availability while minimizing the defense cost) as input, the best combination of “when” and “how” strategies is identified for executing our proposed technique under which the specified goal can be best achieved.


2021 ◽  
Vol 11 (6) ◽  
pp. 7745-7749
Author(s):  
M. F. Hyder ◽  
. Waseemullah ◽  
M. U. Farooq

Moving Target Defense (MTD) has recently emerged as a significant cybersecurity technique. Software-Defined Networking (SDN) has the capability to design efficient network architecture due to its programmability and centralized control management. In this paper, a mechanism for the protection against insider reconnaissance has been proposed using a combination of diversity and a shuffling-based approach of MTD. In order to implement the shuffling technique, IP shuffling is used in the insider network. The IP addresses of internal hosts are mapped via real to virtual IP mapping through random IP generation from a pseudo-random mechanism. For the diversity, a multiple servers’ platform is incorporated for different critical LAN services like Domain Name System (DNS), internal web services, etc. This combined diversity and shuffling approach significantly counters the insider reconnaissance targeting critical LAN services. The proposed scheme also exploited open-source IDS to block insider reconnaissance. The proposed solution was implemented using ONOS SDN controller, Mininet simulator, Snort IDS systems. The experimental results substantiate effective protection against insider network reconnaissance at a low computational cost.


2021 ◽  
Vol 111 ◽  
pp. 102465
Author(s):  
Yifan Hu ◽  
Peidong Zhu ◽  
Peng Xun ◽  
Bo Liu ◽  
Wenjie Kang ◽  
...  

Author(s):  
Peter Martin ◽  
Jian Fan ◽  
Taejin Kim ◽  
Konrad Vesey ◽  
Lloyd Greenwald

2021 ◽  
pp. 42-50
Author(s):  
Bingchi Zhang ◽  
Shujie Yang ◽  
Tao Zhang ◽  
Weixiao Ji ◽  
Zhongyi Ding ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document