Adversarially Adapting Deceptive Views and Reconnaissance Scans on a Software Defined Network
Title | Adversarially Adapting Deceptive Views and Reconnaissance Scans on a Software Defined Network |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Kelly, Jonathan, DeLaus, Michael, Hemberg, Erik, O’Reilly, Una-May |
Conference Name | 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM) |
ISBN Number | 978-3-903176-15-7 |
Keywords | artificial intelligence, coevolution, coevolutionary genetic algorithm, computer network security, deceptive network view, evading detection, Generators, genetic algorithms, high performing static defenses, honeypots, IP addresses, IP networks, Network Deception, Network reconnaissance, NMAP ping scans, optimized configuration, pubcrawl, Reconnaissance, reconnaissance scans, resilience, Resiliency, Scalability, Sociology, Software, Software Defined Network, software defined networking, Software Defined Networks, Statistics, subnets, threat model presumes |
Abstract | To gain strategic insight into defending against the network reconnaissance stage of advanced persistent threats, we recreate the escalating competition between scans and deceptive views on a Software Defined Network (SDN). Our threat model presumes the defense is a deceptive network view unique for each node on the network. It can be configured in terms of the number of honeypots and subnets, as well as how real nodes are distributed across the subnets. It assumes attacks are NMAP ping scans that can be configured in terms of how many IP addresses are scanned and how they are visited. Higher performing defenses detect the scanner quicker while leaking as little information as possible while higher performing attacks are better at evading detection and discovering real nodes. By using Artificial Intelligence in the form of a competitive coevolutionary genetic algorithm, we can analyze the configurations of high performing static defenses and attacks versus their evolving adversary as well as the optimized configuration of the adversary itself. When attacks and defenses both evolve, we can observe that the extent of evolution influences the best configurations. |
URL | https://ieeexplore.ieee.org/document/8717927 |
Citation Key | kelly_adversarially_2019 |
- optimized configuration
- threat model presumes
- subnets
- Statistics
- Software Defined Networks
- software defined networking
- Software Defined Network
- Software
- Sociology
- Scalability
- Resiliency
- resilience
- reconnaissance scans
- Reconnaissance
- pubcrawl
- Artificial Intelligence
- NMAP ping scans
- Network reconnaissance
- Network Deception
- IP networks
- IP addresses
- honeypots
- high performing static defenses
- genetic algorithms
- Generators
- evading detection
- deceptive network view
- computer network security
- coevolutionary genetic algorithm
- coevolution