Yi-xun HU, Kang-feng ZHENG, Yi-xian YANG, et al. Moving target defense solution on network layer based on OpenFlow[J]. Journal on Communications, 2017, 38(10): 102-112.
DOI:
Yi-xun HU, Kang-feng ZHENG, Yi-xian YANG, et al. Moving target defense solution on network layer based on OpenFlow[J]. Journal on Communications, 2017, 38(10): 102-112. DOI: 10.11959/j.issn.1000-436x.2017202.
Moving target defense solution on network layer based on OpenFlow
In order to take an active part in network attack and defense
a moving target defense solution on network layer based on OpenFlow was proposed
using the flexibility of network brought by OpenFlow network architecture.On the network layer
through mapping the correspondent nodes’ addresses to pseudo-random virtual addresses in the LAN and mapping correspondent nodes’ ports to virtual ports
achieving the hiding of correspond nodes in the whole network and the information of network architecture.Researches verify the system’s effectiveness.Comparing with existing moving target defense solutions
the proposed algorithm can be deployed easily in the traditional network
and realize comprehensive protection of the corresponding in the whole network.
CAI G L , WANG B S , WANG T Z , et al . Research and development of moving target defense technology [J ] . Journal of Computer Research and Development , 53 ( 5 ): 968 - 987 .
JACKSON T , SALAMAT B , HOMESCU A , et al . Compiler-generated software diversity [J ] . Moving Target Defense , 2011 : 77 - 98 .
VIKRAM S , YANG C , GU G . Nomad:towards non-intrusive moving-target defense against Web bots [C ] // Communications and Network Security (CNS) . 2013 : 55 - 63 .
PORTOKALIDIS G , KEROMYTIS A D . Global ISR:toward a comprehensive defense against unauthorized code execution [J ] . Moving Target Defense , 2011 : 49 - 76 .
LUCAS B , FULP E W , JOHN D J , et al . An initial framework for evolving computer configurations as a moving target defense [C ] // The 9th Annual Cyber and Information Security Research Conference . 2014 : 69 - 72 .
APPLEGATE S D , . The principle of maneuver in cyber operations [C ] // 2012 4th International Conference on Cyber Conflict (CYCON 2012) . 2012 : 1 - 13 .
CAI G L , WANG B S , LUO Y B , et al . Characterizing the running patterns of moving target defense mechanisms [C ] // 2016 18th International Conference on Advanced Communication Technology (ICACT) . 2016 : 191 - 196 .
TOMMY C , XIONG K Q . Dynamic generation containment systems (DGCS):a moving target defense approach [C ] // 3rd International Workshop on Emerging Ideas and Trends in Engineering of Cyber-Physical Systems (EITEC) . 2016 : 11 - 16 .
KIRKPATRICK K . Software-defined networking [J ] . Communications of the ACM , 2013 .
MCKEOWN N , ANDERSON T , BALAKRISHNAN H , et al . OpenFlow:enabling innovation in campus networks [C ] // ACM SIGCOMM Computer Communication Review . 2008 : 69 - 74 .
JAFARIAN JH , AL-SHAER E , DUAN Q . OpenFlow random host mutation:transparent moving target defense using software defined networking [C ] // The first Workshop on Hot Topics in Software Defined Networks . 2012 : 127 - 132 .
AL-SHAER E , DUAN Q , JAFARIAN J H . Random host mutation for moving target defense [C ] // SecureComm . 2012 : 310 - 327 .
WANG S L , ZHANG L , TANG C J . A new dynamic address solution for moving target defense [C ] // Information Technology,Networking,Electronic and Automation Control Conference . 2016 : 1149 - 1152 .