Visible to the public Decentralized Identifier Distribution for Moving Target Defense and Beyond

TitleDecentralized Identifier Distribution for Moving Target Defense and Beyond
Publication TypeConference Paper
Year of Publication2020
AuthorsKrohmer, D., Schotten, H. D.
Conference Name2020 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)
Date PublishedJune 2020
PublisherIEEE
ISBN Number978-1-7281-6690-2
Keywordscollision probability, Concurrency, concurrency control, cryptographic protocols, cryptographically secure random values, cryptography, Databases, decentralized identifier distribution, IP networks, moving target defense, network entity identifiers, Network Identification, Network reconnaissance, Network security, network security objectives, proactive defense, protocol, Protocols, pubcrawl, Reconnaissance, resilience, Resiliency, Scalability, security, synchronisation, Synchronization, timestamp-based concurrency control algorithms, Twitter, unique universal identifiers
Abstract

In this work, we propose a novel approach for decentralized identifier distribution and synchronization in networks. The protocol generates network entity identifiers composed of timestamps and cryptographically secure random values with a significant reduction of collision probability. The distribution is inspired by Unique Universal Identifiers and Timestamp-based Concurrency Control algorithms originating from database applications. We defined fundamental requirements for the distribution, including: uniqueness, accuracy of distribution, optimal timing behavior, scalability, small impact on network load for different operation modes and overall compliance to common network security objectives. An implementation of the proposed approach is evaluated and the results are presented. Originally designed for a domain of proactive defense strategies known as Moving Target Defense, the general architecture of the protocol enables arbitrary applications where identifier distributions in networks have to be decentralized, rapid and secure.

URLhttps://ieeexplore.ieee.org/document/9139717
DOI10.1109/CyberSA49311.2020.9139717
Citation Keykrohmer_decentralized_2020