首页 > 最新文献

Proceedings of the 2016 ACM Workshop on Moving Target Defense最新文献

英文 中文
Formal Approach for Resilient Reachability based on End-System Route Agility 基于端系统路由敏捷性的弹性可达性形式化方法
Pub Date : 2016-10-24 DOI: 10.1145/2995272.2995275
Usman Rauf, F. Gillani, E. Al-Shaer, M. Halappanavar, S. Chatterjee, C. Oehmen
The deterministic nature of existing routing protocols has resulted into an ossified Internet with static and predictable network routes. This gives persistent attackers (e.g. eavesdroppers and DDoS attackers) plenty of time to study the network and identify the vulnerable (critical) links to plan devastating and stealthy attacks. Recently, Moving Target Defense (MTD) based approaches have been proposed to to defend against DoS attacks. However, MTD based approaches for route mutation are oriented towards re-configuring the parameters in Local Area Networks (LANs), and do not provide any protection against infrastructure level attacks, which inherently limits their use for mission critical services over the Internet infrastructure. To cope with these issues, we extend the current routing architecture to consider end-hosts as routing elements, and present a formal method based agile defense mechanism to embed resiliency in the existing cyber infrastructure. The major contributions of this paper include: (1) formalization of efficient and resilient End to End (E2E) reachability problem as a constraint satisfaction problem, which identifies the potential end-hosts to reach a destination while satisfying resilience and QoS constraints, (2) design and implementation of a novel decentralized End Point Route Mutation (EPRM) protocol, and (3) design and implementation of planning algorithm to minimize the overlap between multiple flows, for the sake of maximizing the agility in the system. Our PlanetLab based implementation and evaluation validates the correctness, effectiveness and scalability of the proposed approach.
现有路由协议的确定性导致了僵化的Internet,具有静态和可预测的网络路由。这给了持久的攻击者(例如窃听者和DDoS攻击者)足够的时间来研究网络,并确定易受攻击的(关键)链接,以计划毁灭性和隐蔽的攻击。近年来,人们提出了基于移动目标防御(MTD)的方法来防御DoS攻击。然而,基于MTD的路由突变方法面向重新配置局域网(lan)中的参数,并且不提供任何针对基础设施级攻击的保护,这本质上限制了它们在互联网基础设施上的关键任务服务的使用。为了解决这些问题,我们扩展了现有的路由架构,将终端主机作为路由元素,并提出了一种基于敏捷防御机制的形式化方法,将弹性嵌入到现有的网络基础设施中。本文的主要贡献包括:(1)将高效、弹性的端到端(E2E)可达性问题形式化为约束满足问题,识别在满足弹性和QoS约束的情况下到达目的地的潜在终端主机;(2)设计和实现一种新型的去中心化端点路由突变(EPRM)协议;(3)设计和实现规划算法,以最小化多个流之间的重叠,从而最大化系统的敏捷性。我们基于PlanetLab的实现和评估验证了所提出方法的正确性、有效性和可扩展性。
{"title":"Formal Approach for Resilient Reachability based on End-System Route Agility","authors":"Usman Rauf, F. Gillani, E. Al-Shaer, M. Halappanavar, S. Chatterjee, C. Oehmen","doi":"10.1145/2995272.2995275","DOIUrl":"https://doi.org/10.1145/2995272.2995275","url":null,"abstract":"The deterministic nature of existing routing protocols has resulted into an ossified Internet with static and predictable network routes. This gives persistent attackers (e.g. eavesdroppers and DDoS attackers) plenty of time to study the network and identify the vulnerable (critical) links to plan devastating and stealthy attacks. Recently, Moving Target Defense (MTD) based approaches have been proposed to to defend against DoS attacks. However, MTD based approaches for route mutation are oriented towards re-configuring the parameters in Local Area Networks (LANs), and do not provide any protection against infrastructure level attacks, which inherently limits their use for mission critical services over the Internet infrastructure. To cope with these issues, we extend the current routing architecture to consider end-hosts as routing elements, and present a formal method based agile defense mechanism to embed resiliency in the existing cyber infrastructure. The major contributions of this paper include: (1) formalization of efficient and resilient End to End (E2E) reachability problem as a constraint satisfaction problem, which identifies the potential end-hosts to reach a destination while satisfying resilience and QoS constraints, (2) design and implementation of a novel decentralized End Point Route Mutation (EPRM) protocol, and (3) design and implementation of planning algorithm to minimize the overlap between multiple flows, for the sake of maximizing the agility in the system. Our PlanetLab based implementation and evaluation validates the correctness, effectiveness and scalability of the proposed approach.","PeriodicalId":20539,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86546798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
SDN based Scalable MTD solution in Cloud Network 云网络中基于SDN的可扩展MTD解决方案
Pub Date : 2016-10-24 DOI: 10.1145/2995272.2995274
Ankur Chowdhary, Sandeep Pisharody, Dijiang Huang
Software-Defined Networking (SDN) has emerged as a framework for centralized command and control in cloud data centric environments. SDN separates data and control plane, which provides network administrator better visibility and policy enforcement capability compared to traditional networks. The SDN controller can assess reachability information of all the hosts in a network. There are many critical assets in a network which can be compromised by a malicious attacker through a multistage attack. Thus we make use of centralized controller to assess the security state of the entire network and pro-actively perform attack analysis and countermeasure selection. This approach is also known as Moving Target Defense (MTD). We use the SDN controller to assess the attack scenarios through scalable Attack Graphs (AG) and select necessary countermeasures to perform network reconfiguration to counter network attacks. Moreover, our framework has a comprehensive conflict detection and resolution module that ensures that no two flow rules in a distributed SDN-based cloud environment have conflicts at any layer; thereby assuring consistent conflict-free policy implementation and preventing information leakage.
软件定义网络(SDN)已成为云数据中心环境中集中命令和控制的框架。SDN将数据平面和控制平面分离,为网络管理员提供了比传统网络更好的可视性和策略实施能力。SDN控制器可以评估网络中所有主机的可达性信息。网络中有许多关键资产可以通过多阶段攻击被恶意攻击者破坏。从而利用集中控制器对整个网络的安全状态进行评估,并主动进行攻击分析和对策选择。这种方法也被称为移动目标防御(MTD)。我们使用SDN控制器通过可扩展攻击图(AG)来评估攻击场景,并选择必要的对策来执行网络重构以对抗网络攻击。此外,我们的框架具有全面的冲突检测和解决模块,确保在基于sdn的分布式云环境中没有两个流规则在任何层发生冲突;从而确保一致的无冲突策略实现并防止信息泄漏。
{"title":"SDN based Scalable MTD solution in Cloud Network","authors":"Ankur Chowdhary, Sandeep Pisharody, Dijiang Huang","doi":"10.1145/2995272.2995274","DOIUrl":"https://doi.org/10.1145/2995272.2995274","url":null,"abstract":"Software-Defined Networking (SDN) has emerged as a framework for centralized command and control in cloud data centric environments. SDN separates data and control plane, which provides network administrator better visibility and policy enforcement capability compared to traditional networks. The SDN controller can assess reachability information of all the hosts in a network. There are many critical assets in a network which can be compromised by a malicious attacker through a multistage attack. Thus we make use of centralized controller to assess the security state of the entire network and pro-actively perform attack analysis and countermeasure selection. This approach is also known as Moving Target Defense (MTD). We use the SDN controller to assess the attack scenarios through scalable Attack Graphs (AG) and select necessary countermeasures to perform network reconfiguration to counter network attacks. Moreover, our framework has a comprehensive conflict detection and resolution module that ensures that no two flow rules in a distributed SDN-based cloud environment have conflicts at any layer; thereby assuring consistent conflict-free policy implementation and preventing information leakage.","PeriodicalId":20539,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","volume":"307 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79689718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
A Moving Target Defense Approach to Disrupting Stealthy Botnets 破坏隐形僵尸网络的移动目标防御方法
Pub Date : 2016-10-24 DOI: 10.1145/2995272.2995280
S. Venkatesan, Massimiliano Albanese, G. Cybenko, S. Jajodia
Botnets are increasingly being used for exfiltrating sensitive data from mission-critical systems. Research has shown that botnets have become extremely sophisticated and can operate in stealth mode by minimizing their host and network footprint. In order to defeat exfiltration by modern botnets, we propose a moving target defense approach for dynamically deploying detectors across a network. Specifically, we propose several strategies based on centrality measures to periodically change the placement of detectors. Our objective is to increase the attacker's effort and likelihood of detection by creating uncertainty about the location of detectors and forcing botmasters to perform additional actions in an attempt to create detector-free paths through the network. We present metrics to evaluate the proposed strategies and an algorithm to compute a lower bound on the detection probability. We validate our approach through simulations, and results confirm that the proposed solution effectively reduces the likelihood of successful exfiltration campaigns.
僵尸网络越来越多地被用于从关键任务系统中窃取敏感数据。研究表明,僵尸网络已经变得非常复杂,可以通过最小化其主机和网络足迹来以隐身模式运行。为了挫败现代僵尸网络的渗透,我们提出了一种动态部署检测器的移动目标防御方法。具体来说,我们提出了几种基于中心性度量的策略来周期性地改变检测器的位置。我们的目标是增加攻击者的努力和检测的可能性,通过创建检测器位置的不确定性,并迫使管理员执行额外的操作,试图在网络中创建无检测器的路径。我们提出了评估所提出的策略的指标和计算检测概率下界的算法。我们通过模拟验证了我们的方法,结果证实了所提出的解决方案有效地降低了成功渗透活动的可能性。
{"title":"A Moving Target Defense Approach to Disrupting Stealthy Botnets","authors":"S. Venkatesan, Massimiliano Albanese, G. Cybenko, S. Jajodia","doi":"10.1145/2995272.2995280","DOIUrl":"https://doi.org/10.1145/2995272.2995280","url":null,"abstract":"Botnets are increasingly being used for exfiltrating sensitive data from mission-critical systems. Research has shown that botnets have become extremely sophisticated and can operate in stealth mode by minimizing their host and network footprint. In order to defeat exfiltration by modern botnets, we propose a moving target defense approach for dynamically deploying detectors across a network. Specifically, we propose several strategies based on centrality measures to periodically change the placement of detectors. Our objective is to increase the attacker's effort and likelihood of detection by creating uncertainty about the location of detectors and forcing botmasters to perform additional actions in an attempt to create detector-free paths through the network. We present metrics to evaluate the proposed strategies and an algorithm to compute a lower bound on the detection probability. We validate our approach through simulations, and results confirm that the proposed solution effectively reduces the likelihood of successful exfiltration campaigns.","PeriodicalId":20539,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84011959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
Markov Modeling of Moving Target Defense Games 移动目标防御博弈的马尔可夫建模
Pub Date : 2016-10-24 DOI: 10.1145/2995272.2995273
M. Valizadeh, Hoda Maleki, W. Koch, Azer Bestavros, Marten van Dijk
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of a broad range of MTD strategies, provides general theorems about how the probability of a successful adversary defeating an MTD strategy is related to the amount of time/cost spent by the adversary, and shows how a multilevel composition of MTD strategies can be analyzed by a straightforward combination of the analysis for each one of these strategies. Within the proposed framework we define the concept of security capacity which measures the strength or effectiveness of an MTD strategy: the security capacity depends on MTD specific parameters and more general system parameters. We apply our framework to two concrete MTD strategies.
提出了一种基于马尔可夫模型的移动目标防御分析框架。该框架允许对广泛的MTD策略进行建模,提供了关于对手成功击败MTD策略的概率如何与对手花费的时间/成本相关的一般定理,并展示了如何通过对这些策略中的每个策略的直接组合分析来分析MTD策略的多层组合。在提出的框架中,我们定义了安全能力的概念,它衡量了MTD策略的强度或有效性:安全能力取决于MTD特定参数和更一般的系统参数。我们将我们的框架应用于两个具体的MTD战略。
{"title":"Markov Modeling of Moving Target Defense Games","authors":"M. Valizadeh, Hoda Maleki, W. Koch, Azer Bestavros, Marten van Dijk","doi":"10.1145/2995272.2995273","DOIUrl":"https://doi.org/10.1145/2995272.2995273","url":null,"abstract":"We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of a broad range of MTD strategies, provides general theorems about how the probability of a successful adversary defeating an MTD strategy is related to the amount of time/cost spent by the adversary, and shows how a multilevel composition of MTD strategies can be analyzed by a straightforward combination of the analysis for each one of these strategies. Within the proposed framework we define the concept of security capacity which measures the strength or effectiveness of an MTD strategy: the security capacity depends on MTD specific parameters and more general system parameters. We apply our framework to two concrete MTD strategies.","PeriodicalId":20539,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","volume":"572 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77190982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Dependency Graph Analysis and Moving Target Defense Selection 依赖图分析与移动目标防御选择
Pub Date : 2016-10-24 DOI: 10.1145/2995272.2995277
J. Hamlet, Christopher C. Lamb
Moving target defense (MTD) is an emerging paradigm in which system defenses dynamically mutate in order to decrease the overall system attack surface. Though the concept is promising, implementations have not been widely adopted. The field has been actively researched for over ten years, and has only produced a small amount of extensively adopted defenses, most notably, address space layout randomization (ASLR). This is despite the fact that there currently exist a variety of moving target implementations and proofs-of-concept. We suspect that this results from the moving target controls breaking critical system dependencies from the perspectives of users and administrators, as well as making things more difficult for attackers. As a result, the impact of the controls on overall system security is not sufficient to overcome the inconvenience imposed on legitimate system users. In this paper, we analyze a successful MTD approach. We study the control's dependency graphs, showing how we use graph theoretic and network properties to predict the effectiveness of the selected control.
移动目标防御(MTD)是一种新兴的防御模式,它通过系统防御动态变化来减少整个系统的攻击面。虽然这个概念很有希望,但实现并没有被广泛采用。该领域已经积极研究了十多年,并且只产生了少量广泛采用的防御措施,最值得注意的是地址空间布局随机化(ASLR)。尽管目前存在各种各样的移动目标实现和概念验证。从用户和管理员的角度来看,我们怀疑这是因为移动的目标控制破坏了关键的系统依赖关系,并使攻击者更加困难。因此,控制对整个系统安全性的影响不足以克服给合法系统用户带来的不便。本文分析了一种成功的MTD方法。我们研究了控制的依赖图,展示了我们如何使用图论和网络属性来预测所选控制的有效性。
{"title":"Dependency Graph Analysis and Moving Target Defense Selection","authors":"J. Hamlet, Christopher C. Lamb","doi":"10.1145/2995272.2995277","DOIUrl":"https://doi.org/10.1145/2995272.2995277","url":null,"abstract":"Moving target defense (MTD) is an emerging paradigm in which system defenses dynamically mutate in order to decrease the overall system attack surface. Though the concept is promising, implementations have not been widely adopted. The field has been actively researched for over ten years, and has only produced a small amount of extensively adopted defenses, most notably, address space layout randomization (ASLR). This is despite the fact that there currently exist a variety of moving target implementations and proofs-of-concept. We suspect that this results from the moving target controls breaking critical system dependencies from the perspectives of users and administrators, as well as making things more difficult for attackers. As a result, the impact of the controls on overall system security is not sufficient to overcome the inconvenience imposed on legitimate system users. In this paper, we analyze a successful MTD approach. We study the control's dependency graphs, showing how we use graph theoretic and network properties to predict the effectiveness of the selected control.","PeriodicalId":20539,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86466992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Have No PHEAR: Networks Without Identifiers 没有phhear:没有标识符的网络
Pub Date : 2016-10-24 DOI: 10.1145/2995272.2995276
R. Skowyra, Kevin S. Bauer, V. Dedhia, Hamed Okhravi
Network protocols such as Ethernet and TCP/IP were not designed to ensure the security and privacy of users. To protect users' privacy, anonymity networks such as Tor have been proposed to hide both identities and communication contents for Internet traffic. However, such solutions cannot protect enterprise network traffic that does not transit the Internet. In this paper, we present the design, implementation, and evaluation of a moving target technique called Packet Header Randomization (PHEAR), a privacy-enhancing system for enterprise networks that leverages emerging Software-Defined Networking hardware and protocols to eliminate identifiers found at the MAC, Network, and higher layers of the network stack. PHEAR also encrypts all packet data beyond the Network layer. We evaluate the security of PHEAR against a variety of known and novel attacks and conduct whole-network experiments that show the prototype deployment provides sufficient performance for common applications such as web browsing and file sharing.
以太网和TCP/IP等网络协议的设计并不是为了确保用户的安全和隐私。为了保护用户的隐私,人们提出了像Tor这样的匿名网络,为互联网流量隐藏身份和通信内容。但是,这种解决方案不能保护不经过Internet的企业网络流量。在本文中,我们介绍了一种称为分组头随机化(PHEAR)的移动目标技术的设计、实现和评估,这是一种用于企业网络的隐私增强系统,它利用新兴的软件定义网络硬件和协议来消除在MAC、网络和网络堆栈的更高层中发现的标识符。phhear还对网络层以外的所有数据包数据进行加密。我们评估了phhear针对各种已知和新型攻击的安全性,并进行了全网实验,表明原型部署为web浏览和文件共享等常见应用提供了足够的性能。
{"title":"Have No PHEAR: Networks Without Identifiers","authors":"R. Skowyra, Kevin S. Bauer, V. Dedhia, Hamed Okhravi","doi":"10.1145/2995272.2995276","DOIUrl":"https://doi.org/10.1145/2995272.2995276","url":null,"abstract":"Network protocols such as Ethernet and TCP/IP were not designed to ensure the security and privacy of users. To protect users' privacy, anonymity networks such as Tor have been proposed to hide both identities and communication contents for Internet traffic. However, such solutions cannot protect enterprise network traffic that does not transit the Internet. In this paper, we present the design, implementation, and evaluation of a moving target technique called Packet Header Randomization (PHEAR), a privacy-enhancing system for enterprise networks that leverages emerging Software-Defined Networking hardware and protocols to eliminate identifiers found at the MAC, Network, and higher layers of the network stack. PHEAR also encrypts all packet data beyond the Network layer. We evaluate the security of PHEAR against a variety of known and novel attacks and conduct whole-network experiments that show the prototype deployment provides sufficient performance for common applications such as web browsing and file sharing.","PeriodicalId":20539,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88384535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Session details: Invited Industry Talk 会议详情:特邀行业讲座
Pub Date : 2016-10-24 DOI: 10.1145/3257182
Peng Liu
{"title":"Session details: Invited Industry Talk","authors":"Peng Liu","doi":"10.1145/3257182","DOIUrl":"https://doi.org/10.1145/3257182","url":null,"abstract":"","PeriodicalId":20539,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77839251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving Target Defense: a Journey from Idea to Product 移动目标防御:从想法到产品的旅程
Pub Date : 2016-10-24 DOI: 10.1145/2995272.2995286
Jason H. Li, J. Yackoski, Nicholas Evancich
In today's enterprise networks, there are many ways for a determined attacker to obtain a foothold, bypass current protection technologies, and attack the intended target. Over several years we have developed the Self-shielding Dynamic Network Architecture (SDNA) technology, which prevents an attacker from targeting, entering, or spreading through an enterprise network by adding dynamics that present a changing view of the network over space and time. SDNA was developed with the support of government sponsored research and development and corporate internal resources. The SDNA technology was purchased by Cryptonite, LLC in 2015 and has been developed into a robust product offering called Cryptonite NXT. In this paper, we describe the journey and lessons learned along the course of feasibility demonstration, technology development, security testing, productization, and deployment in a production network.
在当今的企业网络中,有许多方法可以让有决心的攻击者获得立足点,绕过当前的保护技术,攻击预定的目标。几年来,我们开发了自屏蔽动态网络架构(SDNA)技术,该技术通过添加动态呈现网络随空间和时间变化的视图来防止攻击者瞄准,进入或通过企业网络传播。SDNA是在政府资助的研发和企业内部资源的支持下开发的。SDNA技术于2015年被Cryptonite, LLC收购,并已发展成为一种名为Cryptonite NXT的强大产品。在本文中,我们描述了可行性论证、技术开发、安全测试、产品化和在生产网络中的部署过程中的旅程和经验教训。
{"title":"Moving Target Defense: a Journey from Idea to Product","authors":"Jason H. Li, J. Yackoski, Nicholas Evancich","doi":"10.1145/2995272.2995286","DOIUrl":"https://doi.org/10.1145/2995272.2995286","url":null,"abstract":"In today's enterprise networks, there are many ways for a determined attacker to obtain a foothold, bypass current protection technologies, and attack the intended target. Over several years we have developed the Self-shielding Dynamic Network Architecture (SDNA) technology, which prevents an attacker from targeting, entering, or spreading through an enterprise network by adding dynamics that present a changing view of the network over space and time. SDNA was developed with the support of government sponsored research and development and corporate internal resources. The SDNA technology was purchased by Cryptonite, LLC in 2015 and has been developed into a robust product offering called Cryptonite NXT. In this paper, we describe the journey and lessons learned along the course of feasibility demonstration, technology development, security testing, productization, and deployment in a production network.","PeriodicalId":20539,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72859351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks 实现针对DDoS和隐蔽通道攻击的高性价比移动目标防御
Pub Date : 2016-10-24 DOI: 10.1145/2995272.2995281
Huangxin Wang, Fei Li, Songqing Chen
Traditionally, network and system configurations are static. Attackers have plenty of time to exploit the system's vulnerabilities and thus they are able to choose when to launch attacks wisely to maximize the damage. An unpredictable system configuration can significantly lift the bar for attackers to conduct successful attacks. Recent years, moving target defense (MTD) has been advocated for this purpose. An MTD mechanism aims to introduce dynamics to the system through changing its configuration continuously over time, which we call adaptations. Though promising, the dynamic system reconfiguration introduces overhead to the applications currently running in the system. It is critical to determine the right time to conduct adaptations and to balance the overhead afforded and the security levels guaranteed. This problem is known as the MTD timing problem. Little prior work has been done to investigate the right time in making adaptations. In this paper, we take the first step to both theoretically and experimentally study the timing problem in moving target defenses. For a broad family of attacks including DDoS attacks and cloud covert channel attacks, we model this problem as a renewal reward process and propose an optimal algorithm in deciding the right time to make adaptations with the objective of minimizing the long-term cost rate. In our experiments, both DDoS attacks and cloud covert channel attacks are studied. Simulations based on real network traffic traces are conducted and we demonstrate that our proposed algorithm outperforms known adaptation schemes.
传统上,网络和系统配置是静态的。攻击者有足够的时间来利用系统的漏洞,因此他们能够明智地选择何时发动攻击,以最大限度地造成损害。不可预测的系统配置可以大大提高攻击者进行成功攻击的门槛。近年来,移动目标防御(MTD)已被提出。MTD机制旨在通过随着时间的推移不断地改变其配置来为系统引入动态,我们称之为适应性。尽管前景不错,但动态系统重新配置给系统中当前运行的应用程序带来了开销。确定进行调整的正确时间并平衡所提供的开销和所保证的安全级别是至关重要的。这个问题被称为MTD定时问题。在此之前,几乎没有人研究过做出适应的正确时间。本文首先从理论和实验两方面对移动目标防御中的定时问题进行了研究。对于包括DDoS攻击和云隐蔽通道攻击在内的一系列攻击,我们将此问题建模为更新奖励过程,并提出了一种最佳算法,用于决定正确的时间进行适应,以最小化长期成本率。在实验中,我们研究了DDoS攻击和云隐蔽通道攻击。基于真实网络流量轨迹的仿真结果表明,我们提出的算法优于已知的自适应方案。
{"title":"Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks","authors":"Huangxin Wang, Fei Li, Songqing Chen","doi":"10.1145/2995272.2995281","DOIUrl":"https://doi.org/10.1145/2995272.2995281","url":null,"abstract":"Traditionally, network and system configurations are static. Attackers have plenty of time to exploit the system's vulnerabilities and thus they are able to choose when to launch attacks wisely to maximize the damage. An unpredictable system configuration can significantly lift the bar for attackers to conduct successful attacks. Recent years, moving target defense (MTD) has been advocated for this purpose. An MTD mechanism aims to introduce dynamics to the system through changing its configuration continuously over time, which we call adaptations. Though promising, the dynamic system reconfiguration introduces overhead to the applications currently running in the system. It is critical to determine the right time to conduct adaptations and to balance the overhead afforded and the security levels guaranteed. This problem is known as the MTD timing problem. Little prior work has been done to investigate the right time in making adaptations. In this paper, we take the first step to both theoretically and experimentally study the timing problem in moving target defenses. For a broad family of attacks including DDoS attacks and cloud covert channel attacks, we model this problem as a renewal reward process and propose an optimal algorithm in deciding the right time to make adaptations with the objective of minimizing the long-term cost rate. In our experiments, both DDoS attacks and cloud covert channel attacks are studied. Simulations based on real network traffic traces are conducted and we demonstrate that our proposed algorithm outperforms known adaptation schemes.","PeriodicalId":20539,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","volume":"47 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78592310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Mayflies: A Moving Target Defense Framework for Distributed Systems 蜉蝣:分布式系统的移动目标防御框架
Pub Date : 2016-10-24 DOI: 10.1145/2995272.2995283
Noor O. Ahmed, B. Bhargava
prevent attackers from gaining control of the system using well established techniques such as; perimeter-based fire walls, redundancy and replications, and encryption. However, given sufficient time and resources, all these methods can be defeated. Moving Target Defense (MTD), is a defensive strategy that aims to reduce the need to continuously fight against attacks by disrupting attackers gain-loss balance. We present Mayflies, a bio-inspired generic MTD framework for distributed systems on virtualized cloud platforms. The framework enables systems designed to defend against attacks for their entire runtime to systems that avoid attacks in time intervals. We discuss the design, algorithms and the implementation of the framework prototype. We illustrate the prototype with a quorum-based Byzantime Fault Tolerant system and report the preliminary results.
使用成熟的技术防止攻击者获得对系统的控制,例如;基于边界的防火墙、冗余和复制以及加密。然而,只要有足够的时间和资源,所有这些方法都可以被击败。移动目标防御(MTD)是一种防御策略,旨在通过破坏攻击者的得失平衡来减少持续对抗攻击的需要。我们提出了Mayflies,这是一个受生物启发的通用MTD框架,用于虚拟化云平台上的分布式系统。该框架使设计用于整个运行时抵御攻击的系统能够在一定时间间隔内避免攻击。讨论了框架原型的设计、算法和实现。我们用一个基于群体的Byzantime容错系统演示了该原型,并报告了初步结果。
{"title":"Mayflies: A Moving Target Defense Framework for Distributed Systems","authors":"Noor O. Ahmed, B. Bhargava","doi":"10.1145/2995272.2995283","DOIUrl":"https://doi.org/10.1145/2995272.2995283","url":null,"abstract":"prevent attackers from gaining control of the system using well established techniques such as; perimeter-based fire walls, redundancy and replications, and encryption. However, given sufficient time and resources, all these methods can be defeated. Moving Target Defense (MTD), is a defensive strategy that aims to reduce the need to continuously fight against attacks by disrupting attackers gain-loss balance. We present Mayflies, a bio-inspired generic MTD framework for distributed systems on virtualized cloud platforms. The framework enables systems designed to defend against attacks for their entire runtime to systems that avoid attacks in time intervals. We discuss the design, algorithms and the implementation of the framework prototype. We illustrate the prototype with a quorum-based Byzantime Fault Tolerant system and report the preliminary results.","PeriodicalId":20539,"journal":{"name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","volume":"72 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2016-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90570028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
Proceedings of the 2016 ACM Workshop on Moving Target Defense
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1