Visible to the public Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks

TitleUtilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks
Publication TypeConference Paper
Year of Publication2018
AuthorsAydeger, Abdullah, Saputro, Nico, Akkaya, Kemal
Conference NameMILCOM 2018 - 2018 IEEE Military Communications Conference (MILCOM)
ISBN Number978-1-5386-7185-6
Keywordscentralized management, Computer crime, computer network security, DDoS Attacks, flooding reconnaissance attacks, Internet, Internet Service Provider networks, ISP, link-map, mirrors, moving target defense, MTD, network function virtualization, Network reconnaissance, Network topology, NFV, overlay networks, pubcrawl, Reconnaissance, resilience, Resiliency, Scalability, SDN, Servers, software defined networking, software defined networking technologies, telecommunication network topology, virtual shadow networks, virtualisation, VSNs
Abstract

Moving target defense (MTD) is becoming popular with the advancements in Software Defined Networking (SDN) technologies. With centralized management through SDN, changing the network attributes such as routes to escape from attacks is simple and fast. Yet, the available alternate routes are bounded by the network topology, and a persistent attacker that continuously perform the reconnaissance can extract the whole link-map of the network. To address this issue, we propose to use virtual shadow networks (VSNs) by applying Network Function Virtualization (NFV) abilities to the network in order to deceive attacker with the fake topology information and not reveal the actual network topology and characteristics. We design this approach under a formal framework for Internet Service Provider (ISP) networks and apply it to the recently emerged indirect DDoS attacks, namely Crossfire, for evaluation. The results show that attacker spends more time to figure out the network behavior while the costs on the defender and network operations are negligible until reaching a certain network size.

URLhttps://ieeexplore.ieee.org/document/8599803
DOI10.1109/MILCOM.2018.8599803
Citation Keyaydeger_utilizing_2018