Visible to the public Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks

TitleTowards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks
Publication TypeConference Paper
Year of Publication2016
AuthorsWang, Huangxin, Li, Fei, Chen, Songqing
Conference NameProceedings of the 2016 ACM Workshop on Moving Target Defense
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4570-5
Keywordscomposability, control theory, Dynamical Systems, Metrics, moving target defenses, privacy, pubcrawl, Resiliency, system security, theory
Abstract

Traditionally, network and system configurations are static. Attackers have plenty of time to exploit the system's vulnerabilities and thus they are able to choose when to launch attacks wisely to maximize the damage. An unpredictable system configuration can significantly lift the bar for attackers to conduct successful attacks. Recent years, moving target defense (MTD) has been advocated for this purpose. An MTD mechanism aims to introduce dynamics to the system through changing its configuration continuously over time, which we call adaptations. Though promising, the dynamic system reconfiguration introduces overhead to the applications currently running in the system. It is critical to determine the right time to conduct adaptations and to balance the overhead afforded and the security levels guaranteed. This problem is known as the MTD timing problem. Little prior work has been done to investigate the right time in making adaptations. In this paper, we take the first step to both theoretically and experimentally study the timing problem in moving target defenses. For a broad family of attacks including DDoS attacks and cloud covert channel attacks, we model this problem as a renewal reward process and propose an optimal algorithm in deciding the right time to make adaptations with the objective of minimizing the long-term cost rate. In our experiments, both DDoS attacks and cloud covert channel attacks are studied. Simulations based on real network traffic traces are conducted and we demonstrate that our proposed algorithm outperforms known adaptation schemes.

URLhttp://doi.acm.org/10.1145/2995272.2995281
DOI10.1145/2995272.2995281
Citation Keywang_towards_2016