Effectiveness of Port Hopping as a Moving Target Defense
Title | Effectiveness of Port Hopping as a Moving Target Defense |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Yue-Bin Luo, Bao-Sheng Wang, Gui-Lin Cai |
Conference Name | Security Technology (SecTech), 2014 7th International Conference on |
Date Published | Dec |
Keywords | Analytical models, attacker success likelihood, Computers, moving target defense, network attacks, port hopping, Ports (Computers), proactive defense, proactive defense technology, Probes, Reconnaissance, reconnaissance attack, security of data, Servers, service identity hiding, urn model |
Abstract | Port hopping is a typical moving target defense, which constantly changes service port number to thwart reconnaissance attack. It is effective in hiding service identities and confusing potential attackers, but it is still unknown how effective port hopping is and under what circumstances it is a viable proactive defense because the existed works are limited and they usually discuss only a few parameters and give some empirical studies. This paper introduces urn model and quantifies the likelihood of attacker success in terms of the port pool size, number of probes, number of vulnerable services, and hopping frequency. Theoretical analysis shows that port hopping is an effective and promising proactive defense technology in thwarting network attacks. |
DOI | 10.1109/SecTech.2014.9 |
Citation Key | 7023273 |