Moving target defense (MTD) is a proactive defense mechanism of changing the attack surface to increase an attacker's confusion and/or uncertainty, which invalidates its intelligence gained through reconnaissance and/or network scanning attacks. In this work, we propose software-defined networking (SDN)-based MTD technique using the shuffling of IP addresses and port numbers aiming to obfuscate both network and transport layers' real identities of the host and the service for defending against the network reconnaissance and scanning attacks. We call our proposed MTD technique Random Host and Service Multiplexing, namely RHSM. RHSM allows each host to use random, multiple virtual IP addresses to be dynamically and periodically shuffled. In a...
Due to the constrained resource and computational limitation of many Internet of Things (IoT) device...
Crossfire is an indirect target area link-flooding Distributed Denial of Service (DDoS) attack deter...
The use of traditional defense mechanisms or intrusion detection systems presents a disadvantage for...
Network address shuffling is one of moving target defense (MTD) techniques that can invalidate the a...
Static IP addresses make the network vulnerable to different attacks and once the machines are compr...
With the interconnection of services and customers, network attacks are capable of large amounts of ...
Critical infrastructure control systems continue to foster predictable communication paths and stati...
Moving Target Defense is a technique focused on disrupting certain phases of a cyber-attack. Reconna...
The motivation behind Software-Defined Networking (SDN) is to allow services and network capabilitie...
A Software Defined Network (SDN) provides functionalities for modifying network configurations. To e...
Moving target defense (MTD) has provided a dynamic and proactive network defense to reduce or move t...
Network address shuffling is a novel moving target defense (MTD) that invalidates the address inform...
Moving target systems can help defenders limit the utility of reconnaissance for adversaries, hinder...
Critical infrastructure systems continue to foster predictable communication patterns and static con...
The static and homogeneous nature of the existing state-of-the-art networked systems provides asymme...
Due to the constrained resource and computational limitation of many Internet of Things (IoT) device...
Crossfire is an indirect target area link-flooding Distributed Denial of Service (DDoS) attack deter...
The use of traditional defense mechanisms or intrusion detection systems presents a disadvantage for...
Network address shuffling is one of moving target defense (MTD) techniques that can invalidate the a...
Static IP addresses make the network vulnerable to different attacks and once the machines are compr...
With the interconnection of services and customers, network attacks are capable of large amounts of ...
Critical infrastructure control systems continue to foster predictable communication paths and stati...
Moving Target Defense is a technique focused on disrupting certain phases of a cyber-attack. Reconna...
The motivation behind Software-Defined Networking (SDN) is to allow services and network capabilitie...
A Software Defined Network (SDN) provides functionalities for modifying network configurations. To e...
Moving target defense (MTD) has provided a dynamic and proactive network defense to reduce or move t...
Network address shuffling is a novel moving target defense (MTD) that invalidates the address inform...
Moving target systems can help defenders limit the utility of reconnaissance for adversaries, hinder...
Critical infrastructure systems continue to foster predictable communication patterns and static con...
The static and homogeneous nature of the existing state-of-the-art networked systems provides asymme...
Due to the constrained resource and computational limitation of many Internet of Things (IoT) device...
Crossfire is an indirect target area link-flooding Distributed Denial of Service (DDoS) attack deter...
The use of traditional defense mechanisms or intrusion detection systems presents a disadvantage for...