首页 > 最新文献

Proceedings of the 5th ACM Workshop on Moving Target Defense最新文献

英文 中文
Proceedings of the 5th ACM Workshop on Moving Target Defense 第五届美国计算机学会移动目标防御研讨会论文集
Pub Date : 2018-10-15 DOI: 10.1145/3268966
{"title":"Proceedings of the 5th ACM Workshop on Moving Target Defense","authors":"","doi":"10.1145/3268966","DOIUrl":"https://doi.org/10.1145/3268966","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":"29 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78138120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cloxy: A Context-aware Deception-as-a-Service Reverse Proxy for Web Services Cloxy: Web服务的上下文感知欺骗即服务反向代理
Pub Date : 2018-01-15 DOI: 10.1145/3268966.3268973
Daniel Fraunholz, Daniel Reti, S. D. Antón, H. Schotten
Legacy software, outdated applications and fast changing technologies pose a serious threat to information security. Several domains, such as long-life industrial control systems and Internet of Things devices, suffer from it. In many cases, system updates and new acquisitions are not an option. In this paper, a framework that combines a reverse proxy with various deception-based defense mechanisms is presented. It is designed to autonomously provide deception methods to web applications. Context-awareness and minimal configuration overhead make it perfectly suited to work as a service. The framework is built modularly to provide flexibility and adaptability to the application use case. It is evaluated with common web-based applications such as content management systems and several frequent attack vectors against them. Furthermore, the security and performance implications of the additional security layer are quantified and discussed. It is found that, given sound implementation, no further attack vectors are introduced to the web application. The performance of the prototypical framework increases the delay of communication with the underlying web application. This delay is within tolerable boundaries and can be further reduced by a more efficient implementation.
遗留软件、过时的应用程序和快速变化的技术对信息安全构成严重威胁。一些领域,如长寿命的工业控制系统和物联网设备,都受到它的影响。在许多情况下,系统更新和新收购都不是一个选择。本文提出了一个将反向代理与各种基于欺骗的防御机制相结合的框架。它被设计为自主地为web应用程序提供欺骗方法。上下文感知和最小的配置开销使其非常适合作为服务工作。该框架是模块化构建的,为应用程序用例提供灵活性和适应性。它使用常见的基于web的应用程序(如内容管理系统)和针对它们的几种常见攻击向量进行评估。此外,还对附加安全层的安全性和性能含义进行了量化和讨论。我们发现,在合理的实施下,没有进一步的攻击向量被引入到web应用程序中。原型框架的性能增加了与底层web应用程序通信的延迟。这种延迟在可容忍的范围内,并且可以通过更有效的实现进一步减少。
{"title":"Cloxy: A Context-aware Deception-as-a-Service Reverse Proxy for Web Services","authors":"Daniel Fraunholz, Daniel Reti, S. D. Antón, H. Schotten","doi":"10.1145/3268966.3268973","DOIUrl":"https://doi.org/10.1145/3268966.3268973","url":null,"abstract":"Legacy software, outdated applications and fast changing technologies pose a serious threat to information security. Several domains, such as long-life industrial control systems and Internet of Things devices, suffer from it. In many cases, system updates and new acquisitions are not an option. In this paper, a framework that combines a reverse proxy with various deception-based defense mechanisms is presented. It is designed to autonomously provide deception methods to web applications. Context-awareness and minimal configuration overhead make it perfectly suited to work as a service. The framework is built modularly to provide flexibility and adaptability to the application use case. It is evaluated with common web-based applications such as content management systems and several frequent attack vectors against them. Furthermore, the security and performance implications of the additional security layer are quantified and discussed. It is found that, given sound implementation, no further attack vectors are introduced to the web application. The performance of the prototypical framework increases the delay of communication with the underlying web application. This delay is within tolerable boundaries and can be further reduced by a more efficient implementation.","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":"2016 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86351459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Session details: Session 2: Novel MTD Frameworks and Techniques 会议详情:会议2:新的MTD框架和技术
Pub Date : 2018-01-15 DOI: 10.1145/3285945
W. Connell
{"title":"Session details: Session 2: Novel MTD Frameworks and Techniques","authors":"W. Connell","doi":"10.1145/3285945","DOIUrl":"https://doi.org/10.1145/3285945","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":"54 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79104336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive Security Assessment of Combined MTD Techniques for the Cloud 面向云的组合MTD技术的综合安全评估
Pub Date : 2018-01-15 DOI: 10.1145/3268966.3268967
Hooman Alavizadeh, Jin B. Hong, Julian Jang, Dong Seong Kim
Moving Target Defense (MTD) is a proactive security solution, which can be utilized by cloud computing in order to thwart cyber attacks. Many MTD techniques have been proposed, but there is still a lack of systematic evaluation methods for assessing the effectiveness of the proposed MTD techniques, especially when multiple MTD techniques are to be used in combinations. In this paper, we aim to address the aforementioned issue by proposing an approach for modeling and analysis of MTD techniques. We consider four security metrics: system risk, attack cost, return on attack, and availability to quantify the security of the cloud before and after deploying MTD techniques. Moreover, we propose a Diversity MTD technique to deploy OS diversification with various variants on multiple VMs and also combined Shuffle, Diversity, and Redundancy MTD techniques to improve the security of the cloud. We analyze the security metrics before and after deploying the proposed techniques to show the effectiveness of them. We also utilize importance measures based on network centrality measures into security analysis phase to improve the scalability of the MTD evaluation.
移动目标防御(MTD)是一种主动安全解决方案,可以利用云计算来阻止网络攻击。已经提出了许多MTD技术,但是仍然缺乏系统的评估方法来评估所提出的MTD技术的有效性,特别是当多种MTD技术组合使用时。在本文中,我们的目标是通过提出一种MTD技术的建模和分析方法来解决上述问题。我们考虑了四个安全指标:系统风险、攻击成本、攻击回报和可用性,以便在部署MTD技术前后量化云的安全性。此外,我们提出了一种多样性MTD技术,用于在多个vm上部署具有各种变体的操作系统多样化,并结合Shuffle, Diversity和Redundancy MTD技术来提高云的安全性。我们在部署提议的技术之前和之后分析安全度量,以显示它们的有效性。我们还将基于网络中心性度量的重要性度量引入到安全分析阶段,以提高MTD评估的可扩展性。
{"title":"Comprehensive Security Assessment of Combined MTD Techniques for the Cloud","authors":"Hooman Alavizadeh, Jin B. Hong, Julian Jang, Dong Seong Kim","doi":"10.1145/3268966.3268967","DOIUrl":"https://doi.org/10.1145/3268966.3268967","url":null,"abstract":"Moving Target Defense (MTD) is a proactive security solution, which can be utilized by cloud computing in order to thwart cyber attacks. Many MTD techniques have been proposed, but there is still a lack of systematic evaluation methods for assessing the effectiveness of the proposed MTD techniques, especially when multiple MTD techniques are to be used in combinations. In this paper, we aim to address the aforementioned issue by proposing an approach for modeling and analysis of MTD techniques. We consider four security metrics: system risk, attack cost, return on attack, and availability to quantify the security of the cloud before and after deploying MTD techniques. Moreover, we propose a Diversity MTD technique to deploy OS diversification with various variants on multiple VMs and also combined Shuffle, Diversity, and Redundancy MTD techniques to improve the security of the cloud. We analyze the security metrics before and after deploying the proposed techniques to show the effectiveness of them. We also utilize importance measures based on network centrality measures into security analysis phase to improve the scalability of the MTD evaluation.","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":"209 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89735151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services 安全关键服务移动目标防御的安全哈希承诺方法
Pub Date : 2018-01-15 DOI: 10.1145/3268966.3268969
Dieudonne Mulamba, A. Amarnath, Bruhadeshwar Bezawada, I. Ray
Protection of security-critical services, such as access-control reference monitors, is an important requirement in the modern era of distributed systems and services. The threat arises from hosting the service on a single server for a lengthy period of time, which allows the attacker to periodically enumerate the vulnerabilities of the service with respect to the server's configuration and launch targeted attacks on the service. In our work, we design and implement an efficient solution based on the moving "target" defense strategy, to protect security-critical services against such active adversaries. Specifically, we focus on implementing our solution for protecting the reference monitor service that enforces access control for users requesting access to sensitive resources. The key intuition of our approach is to increase the level of difficulty faced by the attacker to compromise a service by periodically moving the security-critical service among a group of heterogeneous servers. For this approach to be practically feasible, the movement of the service should be efficient and random, i.e., the attacker should not have a-priori information about the choice of the next server hosting the service. Towards this, we describe an efficient Byzantine fault-tolerant leader election protocol that achieves the desired security and performance objectives. We built a prototype implementation that moves the access control service randomly among a group of fifty servers within a time range of 250-440 ms. We show that our approach tolerates Byzantine behavior of servers, which ensures that a server under adversarial control has no additional advantage of being selected as the next active server.
保护安全关键服务,如访问控制参考监视器,是现代分布式系统和服务时代的重要要求。威胁来自于长时间将服务托管在单个服务器上,这使得攻击者可以周期性地枚举服务相对于服务器配置的漏洞,并对服务发起有针对性的攻击。在我们的工作中,我们设计并实现了基于移动“目标”防御策略的有效解决方案,以保护安全关键服务免受此类活跃对手的攻击。具体地说,我们着重于实现我们的解决方案,以保护引用监视服务,该服务对请求访问敏感资源的用户实施访问控制。我们方法的关键直觉是,通过在一组异构服务器之间定期移动安全关键型服务,增加攻击者破坏服务所面临的难度。为了使这种方法实际可行,服务的移动应该是高效和随机的,也就是说,攻击者不应该有关于选择下一个托管服务的服务器的先验信息。为此,我们描述了一种高效的拜占庭容错领导人选举协议,该协议实现了期望的安全和性能目标。我们构建了一个原型实现,它在250-440毫秒的时间范围内在一组50台服务器之间随机移动访问控制服务。我们表明,我们的方法可以容忍服务器的拜占庭行为,这确保了在对抗性控制下的服务器没有被选为下一个活动服务器的额外优势。
{"title":"A Secure Hash Commitment Approach for Moving Target Defense of Security-critical Services","authors":"Dieudonne Mulamba, A. Amarnath, Bruhadeshwar Bezawada, I. Ray","doi":"10.1145/3268966.3268969","DOIUrl":"https://doi.org/10.1145/3268966.3268969","url":null,"abstract":"Protection of security-critical services, such as access-control reference monitors, is an important requirement in the modern era of distributed systems and services. The threat arises from hosting the service on a single server for a lengthy period of time, which allows the attacker to periodically enumerate the vulnerabilities of the service with respect to the server's configuration and launch targeted attacks on the service. In our work, we design and implement an efficient solution based on the moving \"target\" defense strategy, to protect security-critical services against such active adversaries. Specifically, we focus on implementing our solution for protecting the reference monitor service that enforces access control for users requesting access to sensitive resources. The key intuition of our approach is to increase the level of difficulty faced by the attacker to compromise a service by periodically moving the security-critical service among a group of heterogeneous servers. For this approach to be practically feasible, the movement of the service should be efficient and random, i.e., the attacker should not have a-priori information about the choice of the next server hosting the service. Towards this, we describe an efficient Byzantine fault-tolerant leader election protocol that achieves the desired security and performance objectives. We built a prototype implementation that moves the access control service randomly among a group of fifty servers within a time range of 250-440 ms. We show that our approach tolerates Byzantine behavior of servers, which ensures that a server under adversarial control has no additional advantage of being selected as the next active server.","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84152154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantifying the Effectiveness of Software Diversity using Near-Duplicate Detection Algorithms 使用近重复检测算法量化软件多样性的有效性
Pub Date : 2018-01-15 DOI: 10.1145/3268966.3268974
Joel Coffman, A. Chakravarty, Joshua A. Russo, A. Gearhart
Software diversity is touted as a way to substantially increase the cost of cyber attacks by limiting an attacker's ability to reuse exploits across diversified variants of an application. Despite the number of diversity techniques that have been described in the research literature, little is known about their effectiveness. In this paper, we consider near-duplicate detection algorithms as a way to measure the static aspects of software diversity---viz., their ability to recognize variants of an application. Due to the widely varying results reported by previous studies, we describe a novel technique for measuring the similarity of applications that share libraries. We use this technique to systematically compare various near-duplication detection algorithms and demonstrate their wide range in effectiveness, including for real-world tasks such as malware triage. In addition, we use these algorithms as a way to assess the relative strength of various diversity strategies, from recompilation with different compilers and optimization levels to techniques specifically designed to thwart exploit reuse. Our results indicate that even small changes to a binary disproportionately affect the similarity reported by near-duplicate detection algorithms. In addition, we observe a wide range in the effectiveness of various diversity strategies.
软件多样性被吹捧为一种通过限制攻击者在应用程序的不同变体之间重用漏洞的能力来大幅增加网络攻击成本的方法。尽管研究文献中描述了许多多样性技术,但人们对它们的有效性知之甚少。在本文中,我们考虑近重复检测算法作为测量软件多样性的静态方面的一种方法。即识别应用程序变体的能力。由于以前的研究报告的结果差异很大,我们描述了一种测量共享库的应用程序相似性的新技术。我们使用该技术系统地比较各种近重复检测算法,并展示其广泛的有效性,包括用于现实世界的任务,如恶意软件分类。此外,我们使用这些算法来评估各种多样性策略的相对强度,从使用不同编译器和优化级别的重新编译到专门设计用于阻止利用重用的技术。我们的研究结果表明,即使对二进制的微小变化也会不成比例地影响近重复检测算法报告的相似性。此外,我们观察到各种多样性策略的有效性差异很大。
{"title":"Quantifying the Effectiveness of Software Diversity using Near-Duplicate Detection Algorithms","authors":"Joel Coffman, A. Chakravarty, Joshua A. Russo, A. Gearhart","doi":"10.1145/3268966.3268974","DOIUrl":"https://doi.org/10.1145/3268966.3268974","url":null,"abstract":"Software diversity is touted as a way to substantially increase the cost of cyber attacks by limiting an attacker's ability to reuse exploits across diversified variants of an application. Despite the number of diversity techniques that have been described in the research literature, little is known about their effectiveness. In this paper, we consider near-duplicate detection algorithms as a way to measure the static aspects of software diversity---viz., their ability to recognize variants of an application. Due to the widely varying results reported by previous studies, we describe a novel technique for measuring the similarity of applications that share libraries. We use this technique to systematically compare various near-duplication detection algorithms and demonstrate their wide range in effectiveness, including for real-world tasks such as malware triage. In addition, we use these algorithms as a way to assess the relative strength of various diversity strategies, from recompilation with different compilers and optimization levels to techniques specifically designed to thwart exploit reuse. Our results indicate that even small changes to a binary disproportionately affect the similarity reported by near-duplicate detection algorithms. In addition, we observe a wide range in the effectiveness of various diversity strategies.","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91228281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Catch Me If You Can: Dynamic Concealment of Network Entities 抓我如果你可以:网络实体的动态隐藏
Pub Date : 2018-01-15 DOI: 10.1145/3268966.3268970
Daniel Fraunholz, Daniel Krohmer, S. D. Antón, H. Schotten
In this paper, a framework for Moving Target Defense is introduced. This framework bases on three pillars: network address mutation, communication stack randomization and the dynamic deployment of decoys. The network address mutation is based on the concept of domain generation algorithms, where different features are included to fulfill the system requirements. Those requirements are time dependency, unpredictability and determinism. Communication stack randomization is applied additionally to increase the complexity of reconnaissance activity. By employing communication stack randomization, previously fingerprinted systems do not only differ in the network address but also in their communication pattern behavior. And finally, decoys are integrated into the proposed framework to detect attackers that have breached the perimeter. Furthermore, attacker's resources can be bound by interacting with the decoy systems. Additionally, the framework can be extended with more advanced Moving Target Defense methods such as obscuring port numbers of services.
本文介绍了一种移动目标防御的框架。该框架基于三个支柱:网络地址突变、通信栈随机化和诱饵的动态部署。网络地址突变是基于域生成算法的概念,在域生成算法中加入不同的特征来满足系统的需求。这些要求是时间依赖性、不可预测性和决定论。为了增加侦察活动的复杂性,还采用了通信堆栈随机化。通过采用通信栈随机化,以前的指纹系统不仅在网络地址上不同,而且在通信模式行为上也不同。最后,将诱饵集成到提议的框架中,以检测突破边界的攻击者。此外,攻击者的资源可以通过与诱饵系统交互而受到约束。此外,该框架还可以使用更先进的移动目标防御方法进行扩展,例如模糊服务的端口号。
{"title":"Catch Me If You Can: Dynamic Concealment of Network Entities","authors":"Daniel Fraunholz, Daniel Krohmer, S. D. Antón, H. Schotten","doi":"10.1145/3268966.3268970","DOIUrl":"https://doi.org/10.1145/3268966.3268970","url":null,"abstract":"In this paper, a framework for Moving Target Defense is introduced. This framework bases on three pillars: network address mutation, communication stack randomization and the dynamic deployment of decoys. The network address mutation is based on the concept of domain generation algorithms, where different features are included to fulfill the system requirements. Those requirements are time dependency, unpredictability and determinism. Communication stack randomization is applied additionally to increase the complexity of reconnaissance activity. By employing communication stack randomization, previously fingerprinted systems do not only differ in the network address but also in their communication pattern behavior. And finally, decoys are integrated into the proposed framework to detect attackers that have breached the perimeter. Furthermore, attacker's resources can be bound by interacting with the decoy systems. Additionally, the framework can be extended with more advanced Moving Target Defense methods such as obscuring port numbers of services.","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":"59 22 Suppl 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83956882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Analysis of Concurrent Moving Target Defenses 同步移动目标防御分析
Pub Date : 2018-01-15 DOI: 10.1145/3268966.3268972
W. Connell, L. Pham, Samuel Philip
While Moving Target Defenses (MTDs) have been increasingly recognized as a promising direction for cyber security, quantifying the effects of MTDs remains mostly an open problem. Each MTD has its own set of advantages and disadvantages. No single MTD provides an effective defense against the entire range of possible threats. One of the challenges facing MTD quantification efforts is predicting the cumulative effect of implementing multiple MTDs. We present a scenario where two MTDs are deployed in an experimental testbed created to model a realistic use case. This is followed by a probabilistic analysis of the effectiveness of both MTDs against a multi-step attack, along with the MTDs' impact on availability to legitimate users. Our work is essential to providing decision makers with the knowledge to make informed choices regarding cyber defense.
虽然移动目标防御(MTDs)越来越被认为是网络安全的一个有前途的方向,但量化MTDs的影响仍然是一个悬而未决的问题。每个MTD都有自己的优点和缺点。没有单一的MTD能够有效地防御所有可能的威胁。MTD量化工作面临的挑战之一是预测实施多个MTD的累积效应。我们给出了一个场景,其中两个mtd部署在一个实验性测试平台中,该测试平台是为了模拟一个实际的用例而创建的。接下来是对两个mtd对抗多步骤攻击的有效性的概率分析,以及mtd对合法用户可用性的影响。我们的工作对于为决策者提供在网络防御方面做出明智选择的知识至关重要。
{"title":"Analysis of Concurrent Moving Target Defenses","authors":"W. Connell, L. Pham, Samuel Philip","doi":"10.1145/3268966.3268972","DOIUrl":"https://doi.org/10.1145/3268966.3268972","url":null,"abstract":"While Moving Target Defenses (MTDs) have been increasingly recognized as a promising direction for cyber security, quantifying the effects of MTDs remains mostly an open problem. Each MTD has its own set of advantages and disadvantages. No single MTD provides an effective defense against the entire range of possible threats. One of the challenges facing MTD quantification efforts is predicting the cumulative effect of implementing multiple MTDs. We present a scenario where two MTDs are deployed in an experimental testbed created to model a realistic use case. This is followed by a probabilistic analysis of the effectiveness of both MTDs against a multi-step attack, along with the MTDs' impact on availability to legitimate users. Our work is essential to providing decision makers with the knowledge to make informed choices regarding cyber defense.","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87234696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Session details: Session 3: Protection of Critical Services against Advanced Threats 会议详细信息:会议3:保护关键服务免受高级威胁
Pub Date : 2018-01-15 DOI: 10.1145/3285947
V. Casola
{"title":"Session details: Session 3: Protection of Critical Services against Advanced Threats","authors":"V. Casola","doi":"10.1145/3285947","DOIUrl":"https://doi.org/10.1145/3285947","url":null,"abstract":"","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76915767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks 设计弹性SDN控制平面和弹性转发抵御DDoS攻击
Pub Date : 2018-01-15 DOI: 10.1145/3268966.3268968
F. Gillani, E. Al-Shaer, Qi Duan
Using Software-defined Networks in wide area (SDN-WAN) has been strongly emerging in the past years. Due to scalability and economical reasons, SDN-WAN mostly uses an in-band control mechanism, which implies that control and data sharing the same critical physical links. However, the in-band control and centralized control architecture can be exploited by attackers to launch distributed denial of service (DDoS) on SDN control plane by flooding the shared links and/or the Open flow agents. Therefore, constructing a resilient software designed network requires dynamic isolation and distribution of the control flow to minimize damage and significantly increase attack cost. Existing solutions fall short to address this challenge because they require expensive extra dedicated resources or changes in OpenFlow protocol. In this paper, we propose a moving target technique called REsilient COntrol Network architecture (ReCON) that uses the same SDN network resources to defend SDN control plane dynamically against the DDoS attacks. ReCON essentially, (1) minimizes the sharing of critical resources among data and control traffic, and (2) elastically increases the limited capacity of the software control agents on-demand by dynamically using the under-utilized resources from within the same SDN network. To implement a practical solution, we formalize ReCON as a constraints satisfaction problem using Satisfiability Modulo Theory (SMT) to guarantee a correct-by-construction control plan placement that can handle dynamic network conditions.
在广域使用软件定义网络(SDN-WAN)在过去几年中得到了大力发展。出于可扩展性和经济性的考虑,SDN-WAN大多采用带内控制机制,即控制和数据共享在同一条关键物理链路上。然而,带内控制和集中控制架构可以被攻击者利用,通过淹没共享链接和/或开放流代理,在SDN控制平面上发起分布式拒绝服务(DDoS)攻击。因此,构建具有弹性的软件设计网络,需要对控制流进行动态隔离和分配,以最大限度地减少损失,并显著提高攻击成本。现有的解决方案不足以应对这一挑战,因为它们需要昂贵的额外专用资源或对OpenFlow协议进行更改。在本文中,我们提出了一种移动目标技术,称为弹性控制网络架构(ReCON),它使用相同的SDN网络资源来动态保护SDN控制平面免受DDoS攻击。从本质上讲,ReCON(1)最大限度地减少数据和控制流量之间关键资源的共享,以及(2)通过动态使用来自同一SDN网络内未充分利用的资源,按需弹性地增加软件控制代理的有限容量。为了实现一个实际的解决方案,我们使用可满足性模理论(SMT)将ReCON形式化为约束满足问题,以保证可以处理动态网络条件的按结构正确的控制计划放置。
{"title":"In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks","authors":"F. Gillani, E. Al-Shaer, Qi Duan","doi":"10.1145/3268966.3268968","DOIUrl":"https://doi.org/10.1145/3268966.3268968","url":null,"abstract":"Using Software-defined Networks in wide area (SDN-WAN) has been strongly emerging in the past years. Due to scalability and economical reasons, SDN-WAN mostly uses an in-band control mechanism, which implies that control and data sharing the same critical physical links. However, the in-band control and centralized control architecture can be exploited by attackers to launch distributed denial of service (DDoS) on SDN control plane by flooding the shared links and/or the Open flow agents. Therefore, constructing a resilient software designed network requires dynamic isolation and distribution of the control flow to minimize damage and significantly increase attack cost. Existing solutions fall short to address this challenge because they require expensive extra dedicated resources or changes in OpenFlow protocol. In this paper, we propose a moving target technique called REsilient COntrol Network architecture (ReCON) that uses the same SDN network resources to defend SDN control plane dynamically against the DDoS attacks. ReCON essentially, (1) minimizes the sharing of critical resources among data and control traffic, and (2) elastically increases the limited capacity of the software control agents on-demand by dynamically using the under-utilized resources from within the same SDN network. To implement a practical solution, we formalize ReCON as a constraints satisfaction problem using Satisfiability Modulo Theory (SMT) to guarantee a correct-by-construction control plan placement that can handle dynamic network conditions.","PeriodicalId":20619,"journal":{"name":"Proceedings of the 5th ACM Workshop on Moving Target Defense","volume":"148 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2018-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77372427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
Proceedings of the 5th ACM Workshop on Moving Target Defense
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1