RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks

Network servers and applications commonly use static IP addresses and communication ports, making themselves easy targets for network reconnaissances and attacks. Moving target defense (MTD) is an innovatory and promising proactive defense technique. In this paper, we develop a novel MTD mechanism,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEICE Transactions on Information and Systems 2017/03/01, Vol.E100.D(3), pp.496-510
Hauptverfasser: LUO, Yue-Bin, WANG, Bao-Sheng, WANG, Xiao-Feng, ZHANG, Bo-Feng, HU, Wei
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 510
container_issue 3
container_start_page 496
container_title IEICE Transactions on Information and Systems
container_volume E100.D
creator LUO, Yue-Bin
WANG, Bao-Sheng
WANG, Xiao-Feng
ZHANG, Bo-Feng
HU, Wei
description Network servers and applications commonly use static IP addresses and communication ports, making themselves easy targets for network reconnaissances and attacks. Moving target defense (MTD) is an innovatory and promising proactive defense technique. In this paper, we develop a novel MTD mechanism, called Random Port and Address Hopping (RPAH). The goal of RPAH is to hide network servers and applications and resist network reconnaissances and attacks by constantly changing their IP addresses and ports. In order to enhance the unpredictability, RPAH integrates source identity, service identity and temporal parameter in the hopping to provide three hopping frequencies, i.e., source hopping, service hopping and temporal hopping. RPAH provides high unpredictability and the maximum hopping diversities by introducing port and address demultiplexing mechanism, and provides a convenient attack detection mechanism with which the messages from attackers using invalid or inactive addresses/ports will be conveniently detected and denied. Our experiments and evaluation on campus network and PlanetLab show that RPAH is effective in resisting various network reconnaissance and attack models such as network scanning and worm propagation, while introducing an acceptable operation overhead.
doi_str_mv 10.1587/transinf.2016EDP7304
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1893882541</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2014549652</sourcerecordid><originalsourceid>FETCH-LOGICAL-c600t-30d878bcc10bc621a2689d6de18d1d88cb97812be1a2cef5f722a9153de7e2263</originalsourceid><addsrcrecordid>eNpdkE1PGzEQhi3USqS0_4CDpV56Weqx115vbxEJUAkoiuCILMc7GzZsvNTjtOLfs1X4Uk8z0jzvq9HD2CGII9C2-p6Tj9TF9kgKMPPZVaVEuccmUJW6AGXgA5uIGkxhtZL77BPRWgiwEvSE3S6upmc_-JRfDH-6uOLXPq0w80vMf4d0z2fYYiTkFxjufOxowy993ibf9498gdRRpnGGIUbfEfkYkLiPDZ_m7MM9fWYfW98TfnmeB-zmZH59fFac_zr9eTw9L4IRIhdKNLayyxBALIOR4KWxdWMaBNtAY21Y1pUFucTxErDVbSWlr0GrBiuU0qgD9m3X-5CG31uk7DYdBex7H3HYkgNbK2ulLmFEv_6HrodtiuN3brRX6rI2Wo5UuaNCGogStu4hdRufHh0I98-5e3Hu3jkfY4tdbE3Zr_A15FPuQo9voTkI4WZOvSzvSl7h0XhyGNUTHG6Tng</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2014549652</pqid></control><display><type>article</type><title>RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>J-STAGE (Japan Science &amp; Technology Information Aggregator, Electronic) Freely Available Titles - Japanese</source><creator>LUO, Yue-Bin ; WANG, Bao-Sheng ; WANG, Xiao-Feng ; ZHANG, Bo-Feng ; HU, Wei</creator><creatorcontrib>LUO, Yue-Bin ; WANG, Bao-Sheng ; WANG, Xiao-Feng ; ZHANG, Bo-Feng ; HU, Wei</creatorcontrib><description>Network servers and applications commonly use static IP addresses and communication ports, making themselves easy targets for network reconnaissances and attacks. Moving target defense (MTD) is an innovatory and promising proactive defense technique. In this paper, we develop a novel MTD mechanism, called Random Port and Address Hopping (RPAH). The goal of RPAH is to hide network servers and applications and resist network reconnaissances and attacks by constantly changing their IP addresses and ports. In order to enhance the unpredictability, RPAH integrates source identity, service identity and temporal parameter in the hopping to provide three hopping frequencies, i.e., source hopping, service hopping and temporal hopping. RPAH provides high unpredictability and the maximum hopping diversities by introducing port and address demultiplexing mechanism, and provides a convenient attack detection mechanism with which the messages from attackers using invalid or inactive addresses/ports will be conveniently detected and denied. Our experiments and evaluation on campus network and PlanetLab show that RPAH is effective in resisting various network reconnaissance and attack models such as network scanning and worm propagation, while introducing an acceptable operation overhead.</description><identifier>ISSN: 0916-8532</identifier><identifier>EISSN: 1745-1361</identifier><identifier>DOI: 10.1587/transinf.2016EDP7304</identifier><language>eng</language><publisher>Tokyo: The Institute of Electronics, Information and Communication Engineers</publisher><subject>Computer information security ; Computer worms ; Cybersecurity ; Demultiplexing ; IP (Internet Protocol) ; Messages ; moving target defense ; Moving targets ; network security ; Network servers ; Networks ; port and address hopping ; Ports ; reconnaissance ; Resists</subject><ispartof>IEICE Transactions on Information and Systems, 2017/03/01, Vol.E100.D(3), pp.496-510</ispartof><rights>2017 The Institute of Electronics, Information and Communication Engineers</rights><rights>Copyright Japan Science and Technology Agency 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c600t-30d878bcc10bc621a2689d6de18d1d88cb97812be1a2cef5f722a9153de7e2263</citedby><cites>FETCH-LOGICAL-c600t-30d878bcc10bc621a2689d6de18d1d88cb97812be1a2cef5f722a9153de7e2263</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1876,27903,27904</link.rule.ids></links><search><creatorcontrib>LUO, Yue-Bin</creatorcontrib><creatorcontrib>WANG, Bao-Sheng</creatorcontrib><creatorcontrib>WANG, Xiao-Feng</creatorcontrib><creatorcontrib>ZHANG, Bo-Feng</creatorcontrib><creatorcontrib>HU, Wei</creatorcontrib><title>RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks</title><title>IEICE Transactions on Information and Systems</title><addtitle>IEICE Trans. Inf. &amp; Syst.</addtitle><description>Network servers and applications commonly use static IP addresses and communication ports, making themselves easy targets for network reconnaissances and attacks. Moving target defense (MTD) is an innovatory and promising proactive defense technique. In this paper, we develop a novel MTD mechanism, called Random Port and Address Hopping (RPAH). The goal of RPAH is to hide network servers and applications and resist network reconnaissances and attacks by constantly changing their IP addresses and ports. In order to enhance the unpredictability, RPAH integrates source identity, service identity and temporal parameter in the hopping to provide three hopping frequencies, i.e., source hopping, service hopping and temporal hopping. RPAH provides high unpredictability and the maximum hopping diversities by introducing port and address demultiplexing mechanism, and provides a convenient attack detection mechanism with which the messages from attackers using invalid or inactive addresses/ports will be conveniently detected and denied. Our experiments and evaluation on campus network and PlanetLab show that RPAH is effective in resisting various network reconnaissance and attack models such as network scanning and worm propagation, while introducing an acceptable operation overhead.</description><subject>Computer information security</subject><subject>Computer worms</subject><subject>Cybersecurity</subject><subject>Demultiplexing</subject><subject>IP (Internet Protocol)</subject><subject>Messages</subject><subject>moving target defense</subject><subject>Moving targets</subject><subject>network security</subject><subject>Network servers</subject><subject>Networks</subject><subject>port and address hopping</subject><subject>Ports</subject><subject>reconnaissance</subject><subject>Resists</subject><issn>0916-8532</issn><issn>1745-1361</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNpdkE1PGzEQhi3USqS0_4CDpV56Weqx115vbxEJUAkoiuCILMc7GzZsvNTjtOLfs1X4Uk8z0jzvq9HD2CGII9C2-p6Tj9TF9kgKMPPZVaVEuccmUJW6AGXgA5uIGkxhtZL77BPRWgiwEvSE3S6upmc_-JRfDH-6uOLXPq0w80vMf4d0z2fYYiTkFxjufOxowy993ibf9498gdRRpnGGIUbfEfkYkLiPDZ_m7MM9fWYfW98TfnmeB-zmZH59fFac_zr9eTw9L4IRIhdKNLayyxBALIOR4KWxdWMaBNtAY21Y1pUFucTxErDVbSWlr0GrBiuU0qgD9m3X-5CG31uk7DYdBex7H3HYkgNbK2ulLmFEv_6HrodtiuN3brRX6rI2Wo5UuaNCGogStu4hdRufHh0I98-5e3Hu3jkfY4tdbE3Zr_A15FPuQo9voTkI4WZOvSzvSl7h0XhyGNUTHG6Tng</recordid><startdate>20170101</startdate><enddate>20170101</enddate><creator>LUO, Yue-Bin</creator><creator>WANG, Bao-Sheng</creator><creator>WANG, Xiao-Feng</creator><creator>ZHANG, Bo-Feng</creator><creator>HU, Wei</creator><general>The Institute of Electronics, Information and Communication Engineers</general><general>Japan Science and Technology Agency</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20170101</creationdate><title>RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks</title><author>LUO, Yue-Bin ; WANG, Bao-Sheng ; WANG, Xiao-Feng ; ZHANG, Bo-Feng ; HU, Wei</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c600t-30d878bcc10bc621a2689d6de18d1d88cb97812be1a2cef5f722a9153de7e2263</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Computer information security</topic><topic>Computer worms</topic><topic>Cybersecurity</topic><topic>Demultiplexing</topic><topic>IP (Internet Protocol)</topic><topic>Messages</topic><topic>moving target defense</topic><topic>Moving targets</topic><topic>network security</topic><topic>Network servers</topic><topic>Networks</topic><topic>port and address hopping</topic><topic>Ports</topic><topic>reconnaissance</topic><topic>Resists</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>LUO, Yue-Bin</creatorcontrib><creatorcontrib>WANG, Bao-Sheng</creatorcontrib><creatorcontrib>WANG, Xiao-Feng</creatorcontrib><creatorcontrib>ZHANG, Bo-Feng</creatorcontrib><creatorcontrib>HU, Wei</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Information and Systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>LUO, Yue-Bin</au><au>WANG, Bao-Sheng</au><au>WANG, Xiao-Feng</au><au>ZHANG, Bo-Feng</au><au>HU, Wei</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks</atitle><jtitle>IEICE Transactions on Information and Systems</jtitle><addtitle>IEICE Trans. Inf. &amp; Syst.</addtitle><date>2017-01-01</date><risdate>2017</risdate><volume>E100.D</volume><issue>3</issue><spage>496</spage><epage>510</epage><pages>496-510</pages><issn>0916-8532</issn><eissn>1745-1361</eissn><abstract>Network servers and applications commonly use static IP addresses and communication ports, making themselves easy targets for network reconnaissances and attacks. Moving target defense (MTD) is an innovatory and promising proactive defense technique. In this paper, we develop a novel MTD mechanism, called Random Port and Address Hopping (RPAH). The goal of RPAH is to hide network servers and applications and resist network reconnaissances and attacks by constantly changing their IP addresses and ports. In order to enhance the unpredictability, RPAH integrates source identity, service identity and temporal parameter in the hopping to provide three hopping frequencies, i.e., source hopping, service hopping and temporal hopping. RPAH provides high unpredictability and the maximum hopping diversities by introducing port and address demultiplexing mechanism, and provides a convenient attack detection mechanism with which the messages from attackers using invalid or inactive addresses/ports will be conveniently detected and denied. Our experiments and evaluation on campus network and PlanetLab show that RPAH is effective in resisting various network reconnaissance and attack models such as network scanning and worm propagation, while introducing an acceptable operation overhead.</abstract><cop>Tokyo</cop><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transinf.2016EDP7304</doi><tpages>15</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0916-8532
ispartof IEICE Transactions on Information and Systems, 2017/03/01, Vol.E100.D(3), pp.496-510
issn 0916-8532
1745-1361
language eng
recordid cdi_proquest_miscellaneous_1893882541
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; J-STAGE (Japan Science & Technology Information Aggregator, Electronic) Freely Available Titles - Japanese
subjects Computer information security
Computer worms
Cybersecurity
Demultiplexing
IP (Internet Protocol)
Messages
moving target defense
Moving targets
network security
Network servers
Networks
port and address hopping
Ports
reconnaissance
Resists
title RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-26T19%3A46%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=RPAH:%20A%20Moving%20Target%20Network%20Defense%20Mechanism%20Naturally%20Resists%20Reconnaissances%20and%20Attacks&rft.jtitle=IEICE%20Transactions%20on%20Information%20and%20Systems&rft.au=LUO,%20Yue-Bin&rft.date=2017-01-01&rft.volume=E100.D&rft.issue=3&rft.spage=496&rft.epage=510&rft.pages=496-510&rft.issn=0916-8532&rft.eissn=1745-1361&rft_id=info:doi/10.1587/transinf.2016EDP7304&rft_dat=%3Cproquest_cross%3E2014549652%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2014549652&rft_id=info:pmid/&rfr_iscdi=true