A Software-Defined Approach for Mitigating Insider and External Threats via Moving Target Defense

被引:3
作者
d'Ambrosio, Nicola [1 ]
Melluso, Emma [1 ]
Perrone, Gaetano [1 ]
Romano, Simon Pietro [1 ]
机构
[1] Univ Naples Federico II, Dept Elect Engn & Informat Technol, Naples, Italy
来源
2023 IEEE CONFERENCE ON NETWORK FUNCTION VIRTUALIZATION AND SOFTWARE DEFINED NETWORKS, NFV-SDN | 2023年
关键词
Moving Target Defense; Active Deception; Honeynet; Software Defined Network; Insider Threats;
D O I
10.1109/NFV-SDN59219.2023.10329613
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In cyberspace conflicts, defenders face a significant disadvantage. A single mistake in a defense strategy could irreparably compromise a network infrastructure, while attackers can persistently search for vulnerabilities to exploit. Moreover, adversaries can learn from their errors and refine their methods for subsequent attempts. To bridge this gap, deception techniques such as Active Deception (AD) and Moving Target Defense (MTD) have been introduced as an additional layer of defense to enhance traditional cyber-defense strategies. These techniques aim to deceive attackers, detect their activities, and gather intelligence on their attack methodologies. Existing literature focuses on mitigating specific adversarial strategies, such as scanning or service exploitation, rather than providing a comprehensive defense mechanism against diverse threats from both internal and external sources. To tackle this challenge, our approach leverages the combined capabilities of MTD and honeypots to bolster the security of an enterprise network and gain valuable insights into the attacker's behavior. The system accurately detects the attacker's scanning and exploitation activities, redirecting all their connections towards a Honeynet for further analysis and protection of critical assets. Additionally, proactive and reactive port hopping techniques are strategically employed to confuse and mislead the attacker. Through the implementation of these techniques, our goal is to fortify network defenses, increase the complexity faced by potential attackers, and acquire valuable knowledge about their tactics.
引用
收藏
页码:213 / 219
页数:7
相关论文
共 50 条
[41]   A Moving Target Defense Approach to Disrupting Stealthy Botnets [J].
Venkatesan, Sridhar ;
Albanese, Massimiliano ;
Cybenko, George ;
Jajodia, Sushil .
MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE, 2016, :37-46
[42]   A Fast Solution Approach for Path Optimization in Software-Defined Energy Internet [J].
Li, Yuting ;
Wu, Jiang ;
Li, Jiaxin ;
Zhou, Yuzhou ;
Gao, Feng .
2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, :4476-4481
[43]   Software-defined networking approach for enhanced evolved packet core network [J].
Mahmoud, Ashraf ;
Naser, Ahmad Abo ;
Abu-Amara, Marwan ;
Sheltami, Tarek ;
Nasser, Nidal .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (01)
[44]   An Analysis of Hierarchical Software-Defined Network Control Plane: A Reliability Approach [J].
Gaur, Puru ;
Tandon, Amish ;
Goyal, Nupur ;
Chandwani, Gitanjali ;
Ram, Mangey .
INTERNATIONAL JOURNAL OF RELIABILITY QUALITY AND SAFETY ENGINEERING, 2020, 27 (03)
[45]   Development of an Active External Network Topology Module for Floodlight Software-Defined Network Controller [J].
Noskov, A. A. ;
Nikitinskiy, M. A. ;
Alekseev, I. V. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2016, 50 (07) :546-551
[46]   Improving Security Level via Velocity of Moving Target Defense [J].
Nguyen, Quyen L. ;
Sood, Arun .
2016 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C 2016), 2016, :418-419
[47]   Dynamic State Determination of a Software-Defined Network via Dual Basis Representation [J].
Parker, Thomas ;
Johnson, Jamie ;
Tummala, Murali ;
McEachen, John ;
Scrofani, James .
2014 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2014,
[48]   Software Rejuvenation Meets Moving Target Defense: Modeling of Time-Based Virtual Machine Migration Approach [J].
Torquato, Matheus ;
Maciel, Paulo ;
Vieira, Marco .
2022 IEEE 33RD INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2022), 2022, :205-216
[49]   A virtual cluster embedding approach by coordinating virtual network and software-defined network [J].
Tan, Yusong ;
Li, Rongzhen ;
Wu, Qingbo ;
Zhang, Jianfeng .
SOFT COMPUTING, 2018, 22 (23) :7797-7810
[50]   A virtual cluster embedding approach by coordinating virtual network and software-defined network [J].
Yusong Tan ;
Rongzhen Li ;
Qingbo Wu ;
Jianfeng Zhang .
Soft Computing, 2018, 22 :7797-7810