Attacker Skill, Defender Strategies and the Effectiveness of Migration-Based Moving Target Defense in Cyber Systems

被引:0
|
作者
Ben-Asher, Noam [1 ,2 ]
Morris-King, James [2 ]
Thompson, Brian [2 ]
Glodek, William [3 ]
机构
[1] IBM TJ Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] US Army, Res Lab, Adelphi, MD 20783 USA
[3] BreakPoint Labs, Dunn Loring, VA USA
关键词
moving target defense; platform diversity; platform migration; attacker skill; modeling; reconnaissance; exploit; cyber-attack;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Despite the significant effort directed toward securing important cyber systems, many remain vulnerable to advanced, targeted cyber intrusion. Today, most systems that provide network services employ a fixed software stack that typically includes an operating system, web servers, and database software. This software mix as a whole constitutes the attack surface of the host, and a vulnerability in one or more of its components is a threat to the security of the entire system. Moving target defense (MTD) aims to increase the security of a system against successful intrusion by increasing an attacker's uncertainty of the attack surface. Platform migration defense (PMD) is a form of MTD that entails changing the software stack of a system. We consider a scenario in which an attacker gathers information and then selects and launches an attack against a target system that is using PMD. We perform simulations using a multi-agent model to evaluate the effectiveness of PMD against a spectrum of attackers ranging from "script-kiddies" to state-sponsored actors. In particular, we focus on two core characteristics of PMD: (i) migration rate, the frequency at which the platform is changed, and (ii) platform diversity, the number of platform configurations available, as well as two dimensions of an attacker's capabilities: (i) reconnaissance skill, the ability to collect accurate information regarding the target system, and (ii) arsenal size, the number of usable exploits at the attacker's disposal. Our results indicate that increasing migration rate and platform diversity results in a lower rate of successful attacks, even in cases where the attacker has near-perfect information regarding the target system, but that this may come at a cost in system performance. Furthermore, although the strength of an attacker is often measured by their ability to develop or acquire a large arsenal of available exploits, reconnaissance skill may be just as important a determinant for the success of an attack as the arsenal size. Our analysis provides insight into the relationship between attacker and defender capabilities, which can help inform decision-making processes of cyber defenders and lay the grounds for effective automation of cyber maneuvers.
引用
收藏
页码:21 / 30
页数:10
相关论文
共 33 条
  • [31] Controlled measurement set randomization-based moving target defense against coordinated cyber-physical attack in smart grids
    Hu, Yifan
    Zhang, Guomin
    Wang, Xiulei
    Xing, Changyou
    Xu, Bo
    Ding, Ke
    Shi, Weihong
    Ding, Wei
    ELECTRIC POWER SYSTEMS RESEARCH, 2023, 224
  • [32] Defense Strategies Against Network Attacks in Cyber-Physical Systems with Analysis Cost Constraint Based on Honeypot Game Model
    Tian, Wen
    Ji, Xiaopeng
    Liu, Weiwei
    Liu, Guangjie
    Lin, Rong
    Zhai, Jiangtao
    Dai, Yuewei
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (01): : 193 - 211
  • [33] Frequency-Minimal Utility-Maximal Moving Target Defense Against DDoS in SDN-Based Systems
    Debroy, Saptarshi
    Calyam, Prasad
    Minh Nguyen
    Neupane, Roshan Lal
    Mukherjee, Bidyut
    Eeralla, Ajay Kumar
    Salah, Khaled
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2020, 17 (02): : 890 - 903