A Software-Defined Approach for Mitigating Insider and External Threats via Moving Target Defense

被引:0
|
作者
d'Ambrosio, Nicola [1 ]
Melluso, Emma [1 ]
Perrone, Gaetano [1 ]
Romano, Simon Pietro [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, Naples, Italy
关键词
Moving Target Defense; Active Deception; Honeynet; Software Defined Network; Insider Threats;
D O I
10.1109/NFV-SDN59219.2023.10329613
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In cyberspace conflicts, defenders face a significant disadvantage. A single mistake in a defense strategy could irreparably compromise a network infrastructure, while attackers can persistently search for vulnerabilities to exploit. Moreover, adversaries can learn from their errors and refine their methods for subsequent attempts. To bridge this gap, deception techniques such as Active Deception (AD) and Moving Target Defense (MTD) have been introduced as an additional layer of defense to enhance traditional cyber-defense strategies. These techniques aim to deceive attackers, detect their activities, and gather intelligence on their attack methodologies. Existing literature focuses on mitigating specific adversarial strategies, such as scanning or service exploitation, rather than providing a comprehensive defense mechanism against diverse threats from both internal and external sources. To tackle this challenge, our approach leverages the combined capabilities of MTD and honeypots to bolster the security of an enterprise network and gain valuable insights into the attacker's behavior. The system accurately detects the attacker's scanning and exploitation activities, redirecting all their connections towards a Honeynet for further analysis and protection of critical assets. Additionally, proactive and reactive port hopping techniques are strategically employed to confuse and mislead the attacker. Through the implementation of these techniques, our goal is to fortify network defenses, increase the complexity faced by potential attackers, and acquire valuable knowledge about their tactics.
引用
收藏
页码:213 / 219
页数:7
相关论文
共 50 条
  • [21] Security in Software-Defined Networking: Threats and Countermeasures
    Shu, Zhaogang
    Wan, Jiafu
    Li, Di
    Lin, Jiaxiang
    Vasilakos, Athanasios V.
    Imran, Muhammad
    [J]. MOBILE NETWORKS & APPLICATIONS, 2016, 21 (05): : 764 - 776
  • [22] Security in Software-Defined Networking: Threats and Countermeasures
    Zhaogang Shu
    Jiafu Wan
    Di Li
    Jiaxiang Lin
    Athanasios V. Vasilakos
    Muhammad Imran
    [J]. Mobile Networks and Applications, 2016, 21 : 764 - 776
  • [23] Moving Target Defense Against Network Reconnaissance with Software Defined Networking
    Wang, Li
    Wu, Dinghao
    [J]. INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 203 - 217
  • [24] Security Modeling and Analysis of Moving Target Defense in Software Defined Networks
    Mendonca, Julio
    Kim, Minjune
    Graczyk, Rafal
    Volp, Marcus
    Kim, Dan Dongseong
    [J]. 2022 IEEE 27TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2022, : 141 - 151
  • [25] Security Threats in the Data Plane of Software-Defined Networks
    Gao, Shang
    Li, Zecheng
    Xiao, Bin
    Wei, Guiyi
    [J]. IEEE NETWORK, 2018, 32 (04): : 108 - 113
  • [26] A Framework for Threats Analysis Using Software-Defined Networking
    Moldovan, Francisc
    Oprisa, Ciprian
    [J]. 2018 IEEE 14TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING (ICCP), 2018, : 451 - 457
  • [27] A Software-Defined Intranet Dynamic Defense System
    Chen Yang
    Hu Hong-chao
    Cheng Guo-zhen
    [J]. 2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, : 849 - 854
  • [28] Moving Target Defense for In-Vehicle Software-Defined Networking: IP Shuffling in Network Slicing with Multiagent Deep Reinforcement Learning
    Yoon, Seunghyun
    Cho, Jin-Hee
    Kim, Dong Seong
    Moore, Terrence J.
    Nelson, Frederica F.
    Lim, Hyuk
    Leslie, Nandi
    Kamhoua, Charles A.
    [J]. ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING FOR MULTI-DOMAIN OPERATIONS APPLICATIONS II, 2020, 11413
  • [29] A Mathematical Model of Mitigating Memory Randomization Weakness via Moving Target Defense
    Aldossary, Sultan
    Allen, William
    Zhang, Shengzhi
    [J]. PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, : 61 - 67
  • [30] Fine-Grained Fingerprinting Threats to Software-Defined Networks
    Zhang, Minjian
    Hou, Jianwei
    Zhang, Ziqi
    Shi, Wenchang
    Qin, Bo
    Liang, Bin
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 128 - 135