A Software-Defined Approach for Mitigating Insider and External Threats via Moving Target Defense

被引:3
作者
d'Ambrosio, Nicola [1 ]
Melluso, Emma [1 ]
Perrone, Gaetano [1 ]
Romano, Simon Pietro [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, Naples, Italy
来源
2023 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS, NFV-SDN | 2023年
关键词
Moving Target Defense; Active Deception; Honeynet; Software Defined Network; Insider Threats;
D O I
10.1109/NFV-SDN59219.2023.10329613
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In cyberspace conflicts, defenders face a significant disadvantage. A single mistake in a defense strategy could irreparably compromise a network infrastructure, while attackers can persistently search for vulnerabilities to exploit. Moreover, adversaries can learn from their errors and refine their methods for subsequent attempts. To bridge this gap, deception techniques such as Active Deception (AD) and Moving Target Defense (MTD) have been introduced as an additional layer of defense to enhance traditional cyber-defense strategies. These techniques aim to deceive attackers, detect their activities, and gather intelligence on their attack methodologies. Existing literature focuses on mitigating specific adversarial strategies, such as scanning or service exploitation, rather than providing a comprehensive defense mechanism against diverse threats from both internal and external sources. To tackle this challenge, our approach leverages the combined capabilities of MTD and honeypots to bolster the security of an enterprise network and gain valuable insights into the attacker's behavior. The system accurately detects the attacker's scanning and exploitation activities, redirecting all their connections towards a Honeynet for further analysis and protection of critical assets. Additionally, proactive and reactive port hopping techniques are strategically employed to confuse and mislead the attacker. Through the implementation of these techniques, our goal is to fortify network defenses, increase the complexity faced by potential attackers, and acquire valuable knowledge about their tactics.
引用
收藏
页码:213 / 219
页数:7
相关论文
共 50 条
[31]   ChameleonSoft: Software Behavior Encryption for Moving Target Defense [J].
Mohamed Azab ;
Mohamed Eltoweissy .
Mobile Networks and Applications, 2013, 18 :271-292
[32]   Analysis of VM Migration Scheduling as Moving Target Defense against insider attacks [J].
Torquato, Matheus ;
Maciel, Paulo ;
Vieira, Marco .
36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, :194-202
[33]   A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks [J].
Jain, Ankit Kumar ;
Shukla, Hariom ;
Goel, Diksha .
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (09) :13129-13164
[34]   Risk-aware routing approach for software-defined networks [J].
Szwaczyk, Sebastian ;
Amanowicz, Marek ;
Wrona, Konrad ;
Karbowski, Andrzej .
2019 INTERNATIONAL CONFERENCE ON MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS (ICMCIS), 2019,
[35]   An analysis of software-defined routing approach for wireless sensor networks [J].
Manisekaran, S. V. ;
Venkatesan, R. .
COMPUTERS & ELECTRICAL ENGINEERING, 2016, 56 :456-467
[36]   Identity Management in Internet of Things: A Software-Defined Networking Approach [J].
Sadique, Kazi Masum ;
Rahmani, Rahim ;
Johannesson, Paul .
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, DEVICES AND COMPUTING, 2020, 602 :495-504
[37]   Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in SDN networks [J].
Ribeiro, Marcos Aurelio ;
Fonseca, Mauro Sergio Pereira ;
de Santi, Juliana .
COMPUTERS & SECURITY, 2023, 134
[38]   Mitigating Crossfire Attacks using SDN-based Moving Target Defense [J].
Aydeger, Abdullah ;
Saputro, Nico ;
Akkaya, Kemal ;
Rahman, Mohammad .
2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, :627-630
[39]   A Moving Target DDoS Defense Approach in Consortium Blockchain [J].
Gai, Keke ;
Zhang, Guolei ;
Jiang, Peng ;
Zhu, Liehuang ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (04) :4362-4378
[40]   Data Backup Approach using Software-defined Wide Area Network [J].
Attia, Ahmed ;
Khalifa, Nour Eldeen ;
Kotb, Amira .
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (12) :309-316