Attack Surface Expansion Using Decoys to Protect Virtualized Infrastructure

被引:3
作者
Al-Salah, Tulha [1 ]
Hong, Liang [1 ]
Shetty, Sachin [2 ]
机构
[1] Tennessee State Univ, Coll Engn, Nashville, TN 37209 USA
[2] Old Dominion Univ, Virginia Modeling Anal & Simulat Ctr, Norfolk, VA 23529 USA
来源
2017 IEEE 1ST INTERNATIONAL CONFERENCE ON EDGE COMPUTING (IEEE EDGE) | 2017年
关键词
Virtualized Infrastructure; Moving Target Defense; Decoy Virtual Machine; Attack Surface Expansion;
D O I
10.1109/IEEE.EDGE.2017.38
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
As cloud services using the virtualized technique are emerging and developing rapidly, protection of cloud services is a key issue. Most research efforts focus on reducing the attack surface observed by the external attackers, which is an impractical solution for a complex system like virtualized infrastructure. In order to deceive the attackers and waste their time and efforts, three attack surface expansion approaches for moving target defense are proposed in this paper. These three approaches provide different protection capability with different system complexity by using decoy virtual machines that co-exist with the real virtual machines in the same physical host. The probability that the external attacker successfully exploits the valid assets is theoretically analyzed. Simulation results show the attackers' success rate can be significantly reduced by adding decoy virtual machines. Simulation results also show that the greater the knowledge about the attackers' capability, the better protection the proposed approaches can provide.
引用
收藏
页码:216 / 219
页数:4
相关论文
共 11 条
[1]  
Alhebaishi Nawaf., 2016, INT S FDN PRACTICE S, P302
[2]  
Ansiry Zakaria Wira Zanoramy, 2012, Proceedings of the 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT), P696
[3]  
Chisnall David., 2008, DEFINITIVE GUIDE XEN
[4]  
Franklin J, 2014, NISTIR7946
[5]   Scalable Security Models for Assessing Effectiveness of Moving Target Defenses [J].
Hong, Jin B. ;
Kim, Dong Seong .
2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2014, :515-526
[6]  
Peng W, 2014, IEEE ICC, P804, DOI 10.1109/ICC.2014.6883418
[7]  
Ristenpart T, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P199
[8]   A survey on security issues in service delivery models of cloud computing [J].
Subashini, S. ;
Kavitha, V. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (01) :1-11
[9]  
Sun K., 2014, Protecting Enterprise Networks through Attack Surface Expansion, P29
[10]  
Szefer J, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P401