Hiding and Trapping: A Deceptive Approach for Defending against Network Reconnaissance with Software-Defined Network
Title | Hiding and Trapping: A Deceptive Approach for Defending against Network Reconnaissance with Software-Defined Network |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Xing, Junchi, Yang, Mingliang, Zhou, Haifeng, Wu, Chunming, Ruan, Wei |
Conference Name | 2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC) |
ISBN Number | 978-1-7281-1025-7 |
Keywords | adversarial network reconnaissance, computer network security, deceptive technique, decoy nodes, hiding and trapping, host address mutation, Network reconnaissance, neural nets, pubcrawl, resilience, Resiliency, Scalability, scanning attack, software defined networking, software-defined network, software-defined networking, static host address configuration |
Abstract | Network reconnaissance aims at gathering as much information as possible before an attack is launched. Meanwhile, static host address configuration facilitates network reconnaissance. Currently, more sophisticated network reconnaissance has been emerged with the adaptive and cooperative features. To address this, in this paper, we present Hiding and Trapping (HaT), which is a deceptive approach to disrupt adversarial network reconnaissance with the help of the software-defined networking (SDN) paradigm. HaT is able to hide valuable hosts from attackers and to trap them into decoy nodes through strategic and holistic host address mutation according to characteristic of adversaries. We implement a prototype of HaT, and evaluate its performance by experiments. The experimental results show that HaT is capable to effectively disrupt adversarial network reconnaissance with better deceptive performance than the existing address randomization approach. |
URL | https://ieeexplore.ieee.org/document/8958776 |
DOI | 10.1109/IPCCC47392.2019.8958776 |
Citation Key | xing_hiding_2019 |
- pubcrawl
- static host address configuration
- software-defined networking
- software-defined network
- software defined networking
- scanning attack
- Scalability
- Resiliency
- resilience
- adversarial network reconnaissance
- neural nets
- Network reconnaissance
- host address mutation
- hiding and trapping
- decoy nodes
- deceptive technique
- computer network security