Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks
Title | Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Aydeger, Abdullah, Saputro, Nico, Akkaya, Kemal |
Conference Name | MILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM) |
ISBN Number | 978-1-5386-7185-6 |
Keywords | centralized management, Computer crime, computer network security, DDoS Attacks, flooding reconnaissance attacks, Internet, Internet Service Provider networks, ISP, link-map, mirrors, moving target defense, MTD, network function virtualization, Network reconnaissance, Network topology, NFV, overlay networks, pubcrawl, Reconnaissance, resilience, Resiliency, Scalability, SDN, Servers, software defined networking, software defined networking technologies, telecommunication network topology, virtual shadow networks, virtualisation, VSNs |
Abstract | Moving target defense (MTD) is becoming popular with the advancements in Software Defined Networking (SDN) technologies. With centralized management through SDN, changing the network attributes such as routes to escape from attacks is simple and fast. Yet, the available alternate routes are bounded by the network topology, and a persistent attacker that continuously perform the reconnaissance can extract the whole link-map of the network. To address this issue, we propose to use virtual shadow networks (VSNs) by applying Network Function Virtualization (NFV) abilities to the network in order to deceive attacker with the fake topology information and not reveal the actual network topology and characteristics. We design this approach under a formal framework for Internet Service Provider (ISP) networks and apply it to the recently emerged indirect DDoS attacks, namely Crossfire, for evaluation. The results show that attacker spends more time to figure out the network behavior while the costs on the defender and network operations are negligible until reaching a certain network size. |
URL | https://ieeexplore.ieee.org/document/8599803 |
DOI | 10.1109/MILCOM.2018.8599803 |
Citation Key | aydeger_utilizing_2018 |
- NFV
- VSNs
- virtualisation
- virtual shadow networks
- telecommunication network topology
- software defined networking technologies
- software defined networking
- Servers
- SDN
- Scalability
- Resiliency
- resilience
- Reconnaissance
- pubcrawl
- overlay networks
- centralized management
- network topology
- Network reconnaissance
- network function virtualization
- MTD
- moving target defense
- mirrors
- link-map
- ISP
- Internet Service Provider networks
- internet
- flooding reconnaissance attacks
- DDoS Attacks
- computer network security
- Computer crime