On the Random Route Mutation Moving Target Defense
Abstract
In this paper we present a moving target defense tech- nique called Random Route Mutation (RRM). RRM can be implemented over existing network infrastruc- ture seamlessly and can be combined with other security measures such as firewalls and IDSs. We analyse the QoS, capacity, overlap and diagnosability constraints for RRM. We present the formalization and algorithms to implement RRM in the network. Our analysis, simu- lation and preliminary implementation show that RRM is feasible and can defend eavesdropping and infrastruc- ture DoS attacks effectively. To the best of our knowl- edge, this is the first work to proactively apply random route mutation in terms of multiple performance and se- curity constraints.
Switch to experimental viewer
- PDF document
- 11.66 KB
- 617 downloads
- Download
- PDF version
- Printer-friendly version