Defensive Resource Allocations with Security Chokepoints in IPv6 Networks

被引:1
作者
Gueye, Assane [1 ]
Mell, Peter [2 ]
Harang, Richard [3 ]
La, Richard J. [1 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
[2] NIST, Gaithersburg, MD 20899 USA
[3] US Army Res Lab, Adelphi, MD USA
来源
DATA AND APPLICATIONS SECURITY AND PRIVACY XXIX | 2015年 / 9149卷
关键词
Chokepoints; IPv6; Moving target; Vertex partitioning; Security; ATTACK GRAPHS;
D O I
10.1007/978-3-319-20810-7_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securely configured Internet Protocol version 6 networks can be made resistant to network scanning, forcing attackers to propagate following existing benign communication paths. We exploit this attacker limitation in a defensive approach in which heightened security measures are deployed onto a select group of chokepoint hosts to enhance detection or deter penetration. Chokepoints are chosen such that, together, they connect small isolated clusters of the communication graph. Hence, attackers attempting to propagate are limited to a small set of targets or have to penetrate one or more chokepoints. Optimal placement of chokepoints requires solving an NP-hard problem and, hence, we approximate optimal solutions via a suite of heuristics. We test our algorithms on data from a large operational network and discover that heightened security measures are only needed on 0.65% of the nodes to restrict unimpeded attacker propagation to no more than 15% of the network.
引用
收藏
页码:261 / 276
页数:16
相关论文
共 26 条
  • [1] On optimal placement of intrusion detection modules in sensor networks
    Anjum, F
    Subhadrabandhu, D
    Sarkar, S
    Shetty, R
    [J]. FIRST INTERNATIONAL CONFERENCE ON BROADBAND NETWORKS, PROCEEDINGS, 2004, : 690 - 699
  • [2] [Anonymous], 2010 IEEE 10 INT C D
  • [3] [Anonymous], 2002, Zipf, power-laws, and pareto-a ranking tutorial
  • [4] [Anonymous], P 5 WORKSH ALG ENG E
  • [5] Bellovin Steven M, 2006, LOGIN USENIX MAGAZIN, V31, P70
  • [6] FINDING GOOD APPROXIMATE VERTEX AND EDGE PARTITIONS IS NP-HARD
    BUI, TN
    JONES, C
    [J]. INFORMATION PROCESSING LETTERS, 1992, 42 (03) : 153 - 159
  • [7] Chen III P., 2014, CORR
  • [8] Chown T., 2008, 5157 RFC IETF
  • [9] Power-Law Distributions in Empirical Data
    Clauset, Aaron
    Shalizi, Cosma Rohilla
    Newman, M. E. J.
    [J]. SIAM REVIEW, 2009, 51 (04) : 661 - 703
  • [10] Breakdown of the internet under intentional attack
    Cohen, R
    Erez, K
    ben-Avraham, D
    Havlin, S
    [J]. PHYSICAL REVIEW LETTERS, 2001, 86 (16) : 3682 - 3685