Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2663474.2663483acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article

Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers

Published: 03 November 2014 Publication History

Abstract

The static one-to-one binding of hosts to IP addresses allows adversaries to conduct thorough reconnaissance in order to discover and enumerate network assets. Specifically, this fixed address mapping allows distributed network scanners to aggregate information gathered at multiple locations over different times in order to construct an accurate and persistent view of the network. The unvarying nature of this view enables adversaries to collaboratively share and reuse their collected reconnaissance information in various stages of attack planning and execution. This paper presents a novel moving target defense (MTD) technique which enables host-to-IP binding of each destination host to vary randomly across the network based on the source identity (spatial randomization) as well as time (temporal randomization). This spatio-temporal randomization will distort attackers' view of the network by causing the collected reconnaissance information to expire as adversaries transition from one host to another or if they stay long enough in one location. Consequently, adversaries are forced to re-scan the network frequently at each location or over different time intervals. These recurring probings significantly raises the bar for the adversaries by slowing down the attack progress, while improving its detectability. We introduce three novel metrics for quantifying the effectiveness of MTD defense techniques: deterrence, deception, and detectability. Using these metrics, we perform rigorous theoretical and experimental analysis to evaluate the efficacy of this approach. These analyses show that our approach is effective in countering a significant number of sophisticated threat models including collaborative reconnaissance, worm propagation, and advanced persistent threat (APT), in an evasion-free manner.

References

[1]
E. Al-Shaer, Q. Duan, and J. H. Jafarian. Random host mutation for moving target defense. In Proceedings of the 8th International Conference on Security and Privacy in Communication Networks, Padua, Italy, 2012.
[2]
M. Albanese, A. De Benedictis, S. Jajodia, and K. Sun. A moving target defense mechanism for manets based on identity virtualization. In Communications and Network Security (CNS), 2013 IEEE Conference on, pages 278--286, Oct 2013.
[3]
S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. Defending against hitlist worms using network address space randomization. Comput. Netw., 51(12):3471--3490, 2007.
[4]
M. Atighetchi, P. Pal, F. Webber, and C. Jones. Adaptive use of network-centric mechanisms in cyber-defense. In ISORC '03, page 183. IEEE Computer Society, 2003.
[5]
W. v. d. G. C. Contavalli. Client subnet in dns requests. http://tools.ietf.org/html/draft-vandergaast-edns-client-subnet-00, 2011.
[6]
J.-Y. Cai, V. Yegneswaran, C. Alfeld, and P. Barford. An attacker-defender game for honeynets. In Proceedings of the 15th Annual International Conference on Computing and Combinatorics, pages 7--16. Springer-Verlag, 2009.
[7]
M. P. Collins and M. K. Reiter. Hit-list worm detection and bot identification in large networks using protocol graphs. In Proceedings of the 10th international conference on Recent advances in intrusion detection, RAID'07, pages 276--295, Berlin, Heidelberg, 2007. Springer-Verlag.
[8]
V. N. L. Franqueira. Finding multi-step attacks in computer networks using heuristic search and mobile ambients. PhD thesis, University of Twente, Enschede, 2009.
[9]
J. H. Jafarian, E. Al-Shaer, and Q. Duan. Openflow random host mutation: Transparent moving target defense using software defined networking. In Proceedings of HotSDN workshop at SIGCOMM'12, Helsinki, Finland, 2012.
[10]
R. E. Kass, editor. Markov Chain Monte Carlo in Practice (Chapman & Hall/CRC Interdisciplinary Statistics). Chapman and Hall/CRC, 1 edition, Dec. 1995.
[11]
D. Kewley, R. Fink, J. Lowry, and M. Dean. Dynamic approaches to thwart adversary intelligence gathering. In DARPA Information Survivability Conference Exposition II, 2001. DISCEX '01. Proceedings, volume 1, pages 176--185 vol.1, 2001.
[12]
B. Lantz, B. Heller, and N. McKeown. A network in a laptop: rapid prototyping for software-defined networks. In Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks, Hotnets '10, pages 19:1--19:6, New York, NY, USA, 2010. ACM.
[13]
OpenFlow group at Stanford University. POX Wiki, 2013. https://openflow.stanford.edu/display/ONL/POX Wiki.
[14]
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. Openflow: enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev., 38(2):69--74, Mar. 2008.
[15]
L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Technical Report 1999--66, Stanford InfoLab, November 1999.
[16]
K. security lab. Securelist. http://www.securelist.com/en/analysis, 2012.
[17]
S. Stafford and J. Li. Behavior-based worm detectors compared. In S. Jha, R. Sommer, and C. Kreibich, editors, Recent Advances in Intrusion Detection, volume 6307 of Lecture Notes in Computer Science, pages 38--57. Springer Berlin Heidelberg, 2010.
[18]
L. Wang, T. Islam, T. Long, A. Singhal, and S. Jajodia. An attack graph-based probabilistic security metric. In Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security, pages 283--296, Berlin, Heidelberg, 2008. Springer-Verlag.
[19]
J. Yackoski, P. Xie, H. Bullen, J. Li, and K. Sun. A self-shielding dynamic network architecture. In MILITARY COMMUNICATIONS CONFERENCE, 2011 - MILCOM 2011, pages 1381--1386, nov. 2011.
[20]
V. Yegneswaran and C. Alfeld. Camouflaging honeynets. In In Proceedings of IEEE Global Internet Symposium, 2007.
[21]
C. Zou and D. Towsley. Routing Worm: A Fast, Selective Attack Worm Based on IP Address Information. Workshop on Principles of Advanced and Distributed Simulation, pages 199--206, 2005.

Cited By

View all
  • (2024)A proactive defense method against eavesdropping attack in SDN-based storage environmentCybersecurity10.1186/s42400-024-00255-37:1Online publication date: 7-Nov-2024
  • (2023)POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined NetworkingProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3592825(1022-1024)Online publication date: 10-Jul-2023
  • (2023)Deep Reinforcement Learning-based Network Moving Target Defense in DPDK2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00096(491-499)Online publication date: 21-Dec-2023
  • Show More Cited By

Index Terms

  1. Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MTD '14: Proceedings of the First ACM Workshop on Moving Target Defense
    November 2014
    116 pages
    ISBN:9781450331500
    DOI:10.1145/2663474
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 03 November 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. adversary-awareness
    2. ip address randomization
    3. moving target defense (mtd)
    4. reconnaissance

    Qualifiers

    • Research-article

    Conference

    CCS'14
    Sponsor:

    Acceptance Rates

    MTD '14 Paper Acceptance Rate 9 of 16 submissions, 56%;
    Overall Acceptance Rate 40 of 92 submissions, 43%

    Upcoming Conference

    ICSE 2025

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)42
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 25 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)A proactive defense method against eavesdropping attack in SDN-based storage environmentCybersecurity10.1186/s42400-024-00255-37:1Online publication date: 7-Nov-2024
    • (2023)POSTER: Toward Intelligent Cyber Attacks for Moving Target Defense Techniques in Software-Defined NetworkingProceedings of the 2023 ACM Asia Conference on Computer and Communications Security10.1145/3579856.3592825(1022-1024)Online publication date: 10-Jul-2023
    • (2023)Deep Reinforcement Learning-based Network Moving Target Defense in DPDK2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom)10.1109/ISPA-BDCloud-SocialCom-SustainCom59178.2023.00096(491-499)Online publication date: 21-Dec-2023
    • (2023)A Brief review on Network Identity-based Moving Target Defense2023 International Conference on Information Networking (ICOIN)10.1109/ICOIN56518.2023.10048901(610-615)Online publication date: 11-Jan-2023
    • (2023)Host IP Obfuscation and Performance AnalysisProceedings of the Second International Conference on Innovations in Computing Research (ICR’23)10.1007/978-3-031-35308-6_21(245-255)Online publication date: 17-Jun-2023
    • (2023)Collaboration and NegotiationAutonomous Intelligent Cyber Defense Agent (AICA)10.1007/978-3-031-29269-9_11(229-251)Online publication date: 3-Jun-2023
    • (2022)A Survey on Moving Target Defense for Networks: A Practical ViewElectronics10.3390/electronics1118288611:18(2886)Online publication date: 12-Sep-2022
    • (2022)Game Theory Approaches for Evaluating the Deception-based Moving Target DefenseProceedings of the 9th ACM Workshop on Moving Target Defense10.1145/3560828.3563995(67-77)Online publication date: 11-Nov-2022
    • (2022)Hidden-Markov-Model-Enabled Prediction and Visualization of Cyber Agility in IoT EraIEEE Internet of Things Journal10.1109/JIOT.2021.30561189:12(9117-9127)Online publication date: 15-Jun-2022
    • (2022)Dynamic Deployment Model of Lightweight Honeynet for Internet of Things2022 International Conference on 6G Communications and IoT Technologies (6GIoTT)10.1109/6GIoTT57212.2022.00014(30-34)Online publication date: Oct-2022
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media