Evaluating Performance and Security of a Hybrid Moving Target Defense in SDN Environments

被引:1
作者
Kim, Minjune [1 ]
Cho, Jin-Hee [2 ]
Lim, Hyuk [3 ]
Moore, Terrence J. [4 ]
Nelson, Frederica F. [4 ]
Ko, Ryan K. L. [1 ]
Kim, Dan Dongseong [1 ]
机构
[1] Univ Queensland, Brisbane, Qld, Australia
[2] Virginia Tech, Blacksburg, VA USA
[3] Korea Inst Energy Technol KENTECH, Naju, South Korea
[4] DEVCOM Army Res Lab, Aberdeen Proving Ground, MD USA
来源
2022 IEEE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY, QRS | 2022年
关键词
Intrusion Detection; Moving Target Defense; Performance; Rule classification; SDN;
D O I
10.1109/QRS57517.2022.00037
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
As cyberattacks are rising, Moving Target Defense (MTD) can be a countermeasure to proactively protect a networked system against cyber-attacks. Despite the fact that MTD systems demonstrate security effectiveness against the reconnaissance of Cyber Kill Chain (CKC), a time-based MTD has a limitation when it comes to protecting a system against the next phases of CKC. In this work, we propose a novel hybrid MTD technique, its implementation and evaluation. Our hybrid MTD system is designed on a real SDN testbed and it uses an intrusion detection system (IDS) to provide an additional MTD triggering condition. This in itself presents an extra layer of system protection. Our hybrid MTD technique can enhance security in the response to multi-phased cyber-attacks. The use of the reactive MTD triggering from intrusion detection alert shows that it is effective to thwart the further phase of detected cyber-attacks. We also investigate the performance degradation due to more frequent MTD triggers. This work contributes to (1) proposing an ML-based rule classification model for predicting identified attacks which helps a decision-making process for security enhancement; (2) developing a hybrid-based MTD integrated with a Network Intrusion Detection System (NIDS) with the consideration of performance and security; and (3) assessment of the performance degradation and security effectiveness against potential real attacks (i.e., scanning, dictionary, and SQL injection attack) in a physical testbed.
引用
收藏
页码:276 / 286
页数:11
相关论文
共 32 条
[1]  
Ahmed N.O., 2020, IEEE Transactions on Cloud Computing, P1
[2]   Mayflies: A Moving Target Defense Framework for Distributed Systems [J].
Ahmed, Noor ;
Bhargava, Bharat .
MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE, 2016, :59-64
[3]   Defending against hitlist worms using network address space randomization [J].
Antonatos, S. ;
Akritidis, P. ;
Markatos, E. P. ;
Anagnostakis, K. G. .
COMPUTER NETWORKS, 2007, 51 (12) :3471-3490
[4]  
Carroll TE, 2014, IEEE ICC, P701, DOI 10.1109/ICC.2014.6883401
[5]   Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [J].
Cho, Jin-Hee ;
Sharma, Dilli P. ;
Alavizadeh, Hooman ;
Yoon, Seunghyun ;
Ben-Asher, Noam ;
Moore, Terrence J. ;
Kim, Dong Seong ;
Lim, Hyuk ;
Nelson, Frederica F. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01) :709-745
[6]   Cyber defense in breadth: Modeling and analysis of integrated defense systems [J].
Cho, Jin-Hee ;
Ben-Asher, Noam .
JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2018, 15 (02) :147-159
[7]  
Connell W., 2018, PERFORMANCE MODELING
[8]  
Dishington C., 2019, 2019 IEEE INT C TRUS
[9]   Evaluation of Web Security Mechanisms Using Vulnerability & Attack Injection [J].
Fonseca, Jose ;
Vieira, Marco ;
Madeira, Henrique .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (05) :440-453
[10]  
Hong J., 2012, HARMS HIERARCHICAL A