Scaling IPv6 address bindings in support of a moving target defense
Title | Scaling IPv6 address bindings in support of a moving target defense |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Morrell, C., Ransbottom, J.S., Marchany, R., Tront, J.G. |
Conference Name | Internet Technology and Secured Transactions (ICITST), 2014 9th International Conference for |
Date Published | Dec |
Keywords | bound interfaces, client server networks, client server ratio, client-server systems, computer network security, Ethernet interface, Internet, IP networks, IPv6, IPv6 address bindings, IPv6 address space, IPv6 moving target defense, Kernel, Local area networks, malicious actor, moving target defense, MT6D, network security research, networking, peer to peer scenario, Peer-to-peer computing, reconnaissance phase, security, Servers, sockets, Standards, statistical improbability, Time factors, transport protocols, UDP echo server, UDP requests |
Abstract | Moving target defense is an area of network security research in which machines are moved logically around a network in order to avoid detection. This is done by leveraging the immense size of the IPv6 address space and the statistical improbability of two machines selecting the same IPv6 address. This defensive technique forces a malicious actor to focus on the reconnaissance phase of their attack rather than focusing only on finding holes in a machine's static defenses. We have a current implementation of an IPv6 moving target defense entitled MT6D, which works well although is limited to functioning in a peer to peer scenario. As we push our research forward into client server networks, we must discover what the limits are in reference to the client server ratio. In our current implementation of a simple UDP echo server that binds large numbers of IPv6 addresses to the ethernet interface, we discover limits in both the number of addresses that we can successfully bind to an interface and the speed at which UDP requests can be successfully handled across a large number of bound interfaces. |
DOI | 10.1109/ICITST.2014.7038852 |
Citation Key | 7038852 |
- moving target defense
- UDP requests
- UDP echo server
- transport protocols
- Time factors
- statistical improbability
- standards
- sockets
- Servers
- security
- reconnaissance phase
- Peer-to-peer computing
- peer to peer scenario
- networking
- network security research
- MT6D
- bound interfaces
- malicious actor
- Local area networks
- Kernel
- IPv6 moving target defense
- IPv6 address space
- IPv6 address bindings
- IPv6
- IP networks
- internet
- Ethernet interface
- computer network security
- client-server systems
- client server ratio
- client server networks