A moving target defense and network forensics framework for ISP networks using SDN and NFV

被引:42
作者
Aydeger, Abdullah [1 ]
Saputro, Nico [1 ]
Akkaya, Kemal [1 ]
机构
[1] Florida Int Univ, Dept Elect & Comp Engn, Miami, FL 33174 USA
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 94卷
关键词
Moving target defense; Network forensics; SDN; NFV; Crossfire attacks;
D O I
10.1016/j.future.2018.11.045
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the increasing diversity of network attacks, there is a trend towards building more agile networks that can defend themselves or prevent attackers to easily launch attacks. To this end, moving target defense (MTD) mechanisms have started to be pursued to dynamically change the structure and configuration of the networks not only during an attack but also before an attack so that conducting network reconnaissance will become much more difficult. Furthermore, various network forensics mechanisms are introduced to help locating the source and types of attacks as a reactive defense mechanism. Emerging Software Defined Networking (SDN) and Network Function Virtualization (NFV) provide excellent opportunities to implement these mechanisms efficiently. This paper considers MTD in the context of an Internet Service Provider (ISP) network and proposes an architectural framework that will enable it even at the reconnaissance phase while facilitating forensics investigations. We propose various virtual shadow networks through NFV to be used when implementing MTD mechanisms via route mutation. The idea is to dynamically change the routes for specific reconnaissance packets so that attackers will not be able to easily identify the actual network topologies for potential distributed denial of service attacks (DDoS) such as Crossfire while enabling the defender to store potential attacker's information through a forensics feature. We present an integrated framework that encompasses these features. The proposed framework is implemented in Mininet to test its effectiveness and overheads. The results demonstrated the effectiveness in terms of failing the attackers at the expense of slightly increased path lengths, end-to-end delay and storage for forensic purposes. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:496 / 509
页数:14
相关论文
共 39 条
[1]  
[Anonymous], 8 INT S PAR ARCH ALG
[2]  
[Anonymous], 2014, P NDSS WORKSH SEC EM
[3]  
[Anonymous], MOVING TARGET DEFENS
[4]  
[Anonymous], SDN NFV REF ARCH VER
[5]  
[Anonymous], ARCH WHIT PAP
[6]  
[Anonymous], 2015, STRATECAST PERSPECTI
[7]   Mitigating Crossfire Attacks using SDN-based Moving Target Defense [J].
Aydeger, Abdullah ;
Saputro, Nico ;
Akkaya, Kemal ;
Rahman, Mohammad .
2016 IEEE 41ST CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2016, :627-630
[8]   Satisfiability modulo theories [J].
Barrett, Clark ;
Sebastiani, Roberto ;
Seshia, Sanjit A. ;
Tinelli, Cesare .
Frontiers in Artificial Intelligence and Applications, 2009, 185 (01) :825-885
[9]   Demystifying Configuration Challenges and Trade-Offs in Network-based ISP Services [J].
Benson, Theophilus ;
Akella, Aditya ;
Shaikh, Aman .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) :302-313
[10]  
Cacheda Rafael., 2007, Resource Management in Satellite Networks, P67