Visible to the public Effectiveness of Port Hopping as a Moving Target Defense

TitleEffectiveness of Port Hopping as a Moving Target Defense
Publication TypeConference Paper
Year of Publication2014
AuthorsYue-Bin Luo, Bao-Sheng Wang, Gui-Lin Cai
Conference NameSecurity Technology (SecTech), 2014 7th International Conference on
Date PublishedDec
KeywordsAnalytical models, attacker success likelihood, Computers, moving target defense, network attacks, port hopping, Ports (Computers), proactive defense, proactive defense technology, Probes, Reconnaissance, reconnaissance attack, security of data, Servers, service identity hiding, urn model
Abstract

Port hopping is a typical moving target defense, which constantly changes service port number to thwart reconnaissance attack. It is effective in hiding service identities and confusing potential attackers, but it is still unknown how effective port hopping is and under what circumstances it is a viable proactive defense because the existed works are limited and they usually discuss only a few parameters and give some empirical studies. This paper introduces urn model and quantifies the likelihood of attacker success in terms of the port pool size, number of probes, number of vulnerable services, and hopping frequency. Theoretical analysis shows that port hopping is an effective and promising proactive defense technology in thwarting network attacks.

DOI10.1109/SecTech.2014.9
Citation Key7023273