Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies

被引:57
作者
Achleitner, Stefan [1 ]
La Porta, Thomas F. [4 ]
McDaniel, Patrick [4 ,5 ]
Sugrim, Shridatt [2 ]
Krishnamurthy, Srikanth V. [3 ]
Chadha, Ritu [2 ]
机构
[1] Penn State Univ, Comp Sci & Engn, University Pk, PA 16802 USA
[2] Vencore Labs, Basking Ridge, NJ 07920 USA
[3] Univ Calif Riverside, Comp Sci, Riverside, CA 92521 USA
[4] Penn State Univ, Sch Elect Engn & Comp Sci, University Pk, PA 16802 USA
[5] Penn State Univ, Inst Networking & Secur Res, University Pk, PA 16802 USA
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2017年 / 14卷 / 04期
关键词
Software-defined networks; security services; security management;
D O I
10.1109/TNSM.2017.2724239
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Advanced targeted cyber attacks often rely on reconnaissance missions to gather information about potential targets, their characteristics and location to identify vulnerabilities in a networked environment. Advanced network scanning techniques are often used for this purpose and are automatically executed by malware infected hosts. In this paper, we formally define network deception to defend reconnaissance and develop a reconnaissance deception system, which is based on software defined networking, to achieve deception by simulating virtual topologies. Our system thwarts network reconnaissance by delaying the scanning techniques of adversaries and invalidating their collected information, while limiting the performance impact on benign network traffic. By simulating the topological as well as physical characteristics of networks, we introduce a system which deceives malicious network discovery and reconnaissance techniques with virtual information, while limiting the information an attacker is able to harvest from the true underlying system. This approach shows a novel defense technique against adversarial reconnaissance missions which are required for targeted cyber attacks such as advanced persistent threats in highly connected environments. The defense steps of our system aim to invalidate an attackers information, delay the process of finding vulnerable hosts and identify the source of adversarial reconnaissance within a network.
引用
收藏
页码:1098 / 1112
页数:15
相关论文
共 34 条
  • [11] Chiang CYJ, 2016, IEEE MILIT COMMUN C, P800, DOI 10.1109/MILCOM.2016.7795427
  • [12] Source Flow: Handling Millions of Flows on Flow-based Nodes
    Chiba, Yasunobu
    Shinohara, Yusuke
    Shimonishi, Hideyuki
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (04) : 465 - 466
  • [13] Efficient Network Tomography for Internet Topology Discovery
    Eriksson, Brian
    Dasarathy, Gautam
    Barford, Paul
    Nowak, Robert
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2012, 20 (03) : 931 - 943
  • [14] Combining Open Flow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
    Giotis, K.
    Argyropoulos, C.
    Androulidakis, G.
    Kalogeras, D.
    Maglaris, V.
    [J]. COMPUTER NETWORKS, 2014, 62 : 122 - 136
  • [15] Jafarian Jafar Haadi, 2015, 2015 IEEE Conference on Computer Communications (INFOCOM). Proceedings, P738, DOI 10.1109/INFOCOM.2015.7218443
  • [16] An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks
    Jafarian, Jafar Haadi
    Al-Shaer, Ehab
    Duan, Qi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (12) : 2562 - 2577
  • [17] Jafarian JH, 2012, P 1 WORKSH HOT TOP S, P127, DOI DOI 10.1145/2342441.2342467
  • [18] What You Need to Know About SDN Flow Tables
    Kuzniar, Maciej
    Peresini, Peter
    Kostic, Dejan
    [J]. PASSIVE AND ACTIVE MEASUREMENT (PAM 2015), 2015, 8995 : 347 - 359
  • [19] Le Malecot E., 2009, Proceedings of the 4th USENIX Workshop on Hot Topics in Security (HotSec'09), P4
  • [20] Understanding Divide-Conquer-Scanning Worms
    Li, Yubin
    Chen, Zesheng
    Chen, Chao
    [J]. 2008 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC 2008), 2008, : 51 - 58