Visible to the public Adversarially Adapting Deceptive Views and Reconnaissance Scans on a Software Defined Network

TitleAdversarially Adapting Deceptive Views and Reconnaissance Scans on a Software Defined Network
Publication TypeConference Paper
Year of Publication2019
AuthorsKelly, Jonathan, DeLaus, Michael, Hemberg, Erik, O’Reilly, Una-May
Conference Name2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM)
ISBN Number978-3-903176-15-7
Keywordsartificial intelligence, coevolution, coevolutionary genetic algorithm, computer network security, deceptive network view, evading detection, Generators, genetic algorithms, high performing static defenses, honeypots, IP addresses, IP networks, Network Deception, Network reconnaissance, NMAP ping scans, optimized configuration, pubcrawl, Reconnaissance, reconnaissance scans, resilience, Resiliency, Scalability, Sociology, Software, Software Defined Network, software defined networking, Software Defined Networks, Statistics, subnets, threat model presumes
Abstract

To gain strategic insight into defending against the network reconnaissance stage of advanced persistent threats, we recreate the escalating competition between scans and deceptive views on a Software Defined Network (SDN). Our threat model presumes the defense is a deceptive network view unique for each node on the network. It can be configured in terms of the number of honeypots and subnets, as well as how real nodes are distributed across the subnets. It assumes attacks are NMAP ping scans that can be configured in terms of how many IP addresses are scanned and how they are visited. Higher performing defenses detect the scanner quicker while leaking as little information as possible while higher performing attacks are better at evading detection and discovering real nodes. By using Artificial Intelligence in the form of a competitive coevolutionary genetic algorithm, we can analyze the configurations of high performing static defenses and attacks versus their evolving adversary as well as the optimized configuration of the adversary itself. When attacks and defenses both evolve, we can observe that the extent of evolution influences the best configurations.

URLhttps://ieeexplore.ieee.org/document/8717927
Citation Keykelly_adversarially_2019