Moving Target Defense for Securing SCADA Communications

被引:15
|
作者
Heydari, Vahid [1 ]
机构
[1] Rowan Univ, Comp Sci Dept, Glassboro, NJ 08028 USA
来源
IEEE ACCESS | 2018年 / 6卷
关键词
SCADA; mobile IPv6; moving target defense; dynamic IP; ATTACKS;
D O I
10.1109/ACCESS.2018.2844542
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a framework for building a secure and private peer to peer communication used in supervisory control and data acquisition networks with a novel Mobile IPv6-based moving target defense strategy. Our approach aids in combating remote cyber-attacks against peer hosts by thwarting any potential attacks at their reconnaissance stage. The IP address of each host is randomly changed at a certain interval creating a moving target to make it difficult for an attacker to find the host. At the same time, the peer host is updated through the use of the binding update procedure (standard Mobile IPv6 protocol). Compared with existing results that can incur significant packet-loss during address rotations, the proposed solution is loss-less. Improving privacy and anonymity for communicating hosts by removing permanent IP addresses from all packets is also one of the major contributions of this paper. Another contribution is preventing black hole attacks and bandwidth depletion DDoS attacks through the use of extra paths between the peer hosts. Recovering the communication after rebooting a host is also a new contribution of this paper. Lab-based simulation results are presented to demonstrate the performance of the method in action, including its overheads. The testbed experiments show zero packet-loss rate during handoff delay.
引用
收藏
页码:33329 / 33343
页数:15
相关论文
共 50 条
  • [31] Looking at a Moving Target Defense of EthernetIP
    Davidson, Cordell C.
    Andel, Todd R.
    McDonald, J. Todd
    SOUTHEASTCON 2022, 2022, : 757 - 764
  • [32] Moving target defense in distributed systems
    Shetty S.
    Yuchi X.
    Song M.
    Wireless Networks, 2016, 0 : 1 - 11
  • [33] Benign false-data injection as a moving-target defense to secure mobile wireless communications
    Ghourab, Esraa M.
    Azab, Mohamed
    AD HOC NETWORKS, 2020, 102
  • [34] Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense
    Cho, Jin-Hee
    Sharma, Dilli P.
    Alavizadeh, Hooman
    Yoon, Seunghyun
    Ben-Asher, Noam
    Moore, Terrence J.
    Kim, Dong Seong
    Lim, Hyuk
    Nelson, Frederica F.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 709 - 745
  • [35] Feasibility of Applying Moving Target Defensive Techniques in a SCADA System
    Davidson, Cordell
    Andel, Todd
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 363 - 370
  • [36] DOLOS: A Novel Architecture for Moving Target Defense
    Pagnotta, Giulio
    De Gaspari, Fabio
    Hitaj, Dorjan
    Andreolini, Mauro
    Colajanni, Michele
    Mancini, Luigi V.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5890 - 5905
  • [37] Implementation of a Lossless Moving Target Defense Mechanism
    Zal, Mariusz
    Michalski, Marek
    Zwierzykowski, Piotr
    ELECTRONICS, 2024, 13 (05)
  • [38] A Signaling Game Model for Moving Target Defense
    Feng, Xiaotao
    Zheng, Zizhan
    Cansever, Derya
    Swami, Ananthram
    Mohapatra, Prasant
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [39] Toward a Moving Target Defense for Web Applications
    Taguinod, Marthony
    Doupe, Adam
    Zhao, Ziming
    Ahn, Gail-Joon
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2015, : 510 - 517
  • [40] Using Dynamic Addressing for a Moving Target Defense
    Groat, Stephen
    Dunlop, Matthew
    Marchany, Randy
    Tront, Joseph
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 84 - 91