A Software-Defined Approach for Mitigating Insider and External Threats via Moving Target Defense

被引:3
作者
d'Ambrosio, Nicola [1 ]
Melluso, Emma [1 ]
Perrone, Gaetano [1 ]
Romano, Simon Pietro [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, Naples, Italy
来源
2023 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS, NFV-SDN | 2023年
关键词
Moving Target Defense; Active Deception; Honeynet; Software Defined Network; Insider Threats;
D O I
10.1109/NFV-SDN59219.2023.10329613
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In cyberspace conflicts, defenders face a significant disadvantage. A single mistake in a defense strategy could irreparably compromise a network infrastructure, while attackers can persistently search for vulnerabilities to exploit. Moreover, adversaries can learn from their errors and refine their methods for subsequent attempts. To bridge this gap, deception techniques such as Active Deception (AD) and Moving Target Defense (MTD) have been introduced as an additional layer of defense to enhance traditional cyber-defense strategies. These techniques aim to deceive attackers, detect their activities, and gather intelligence on their attack methodologies. Existing literature focuses on mitigating specific adversarial strategies, such as scanning or service exploitation, rather than providing a comprehensive defense mechanism against diverse threats from both internal and external sources. To tackle this challenge, our approach leverages the combined capabilities of MTD and honeypots to bolster the security of an enterprise network and gain valuable insights into the attacker's behavior. The system accurately detects the attacker's scanning and exploitation activities, redirecting all their connections towards a Honeynet for further analysis and protection of critical assets. Additionally, proactive and reactive port hopping techniques are strategically employed to confuse and mislead the attacker. Through the implementation of these techniques, our goal is to fortify network defenses, increase the complexity faced by potential attackers, and acquire valuable knowledge about their tactics.
引用
收藏
页码:213 / 219
页数:7
相关论文
共 50 条
[21]   Towards Crossfire Distributed Denial of Service Attack Protection Using Intent-Based Moving Target Defense Over Software-Defined Networking [J].
Hyder, Muhammad Faraz ;
Fatima, Tasbiha .
IEEE ACCESS, 2021, 9 :112792-112804
[22]   Insider Threat Mitigation Using Moving Target Defense and Deception [J].
Takabi, Hassan ;
Jafarian, J. Haadi .
PROCEEDINGS OF THE 2017 INTERNATIONAL WORKSHOP ON MANAGING INSIDER SECURITY THREATS (MIST'17), 2017, :93-96
[23]   INMTD: Intent-based Moving Target Defense Framework using Software Defined Networks [J].
Hyder, Muhammad Faraz ;
Ismail, Muhammad Ali .
ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2020, 10 (01) :5142-5147
[24]   Towards adding digital forensics capabilities in software defined networking based moving target defense [J].
Hyder, Muhammad Faraz ;
Fatima, Tasbiha ;
Arshad, Saadia .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (01) :893-912
[25]   Towards adding digital forensics capabilities in software defined networking based moving target defense [J].
Muhammad Faraz Hyder ;
Tasbiha Fatima ;
Saadia Arshad .
Cluster Computing, 2024, 27 :893-912
[26]   OpenRAN: A Software-defined RAN Architecture Via Virtualization [J].
Yang, Mao ;
Li, Yong ;
Jin, Depeng ;
Su, Li ;
Ma, Shaowu ;
Zeng, Lieguang .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2013, 43 (04) :549-550
[27]   A Novel Route Randomization Approach for Moving Target Defense [J].
Wang, Shaolei ;
Zhou, Ying ;
Guo, Ronghua ;
Du, Jing ;
Du, Jiawei .
2018 IEEE 18TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2018, :11-15
[28]   Ensemble Deep Learning Models for Mitigating DDoS Attack in Software-Defined Network [J].
Alanazi, Fatmah ;
Jambi, Kamal ;
Eassa, Fathy ;
Khemakhem, Maher ;
Basuhail, Abdullah ;
Alsubhi, Khalid .
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 33 (02) :923-938
[29]   Design and Performance Analysis of Software Defined Networking based Web Services Adopting Moving Target Defense [J].
Kim, Dong Seong ;
Kim, Minjune ;
Cho, Jin-Hee ;
Lim, Hyuk ;
Moore, Terrence J. ;
Nelson, Frederica F. .
2020 50TH ANNUAL IEEE-IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME (DSN-S), 2020, :43-44
[30]   ChameleonSoft: Software Behavior Encryption for Moving Target Defense [J].
Azab, Mohamed ;
Eltoweissy, Mohamed .
MOBILE NETWORKS & APPLICATIONS, 2013, 18 (02) :271-292