Back to Search Start Over

Ghost-MTD: Moving Target Defense via Protocol Mutation for Mission-Critical Cloud Systems.

Authors :
Park, Jun-Gyu
Lee, Yangjae
Kang, Ki-Wan
Lee, Sang-Hoon
Park, Ki-Woong
Source :
Energies (19961073); Apr2020, Vol. 13 Issue 8, p1883, 1p, 4 Diagrams, 3 Graphs
Publication Year :
2020

Abstract

Research on various security technologies has been actively underway to protect systems from attackers. However, attackers can secure enough time to reconnoiter and attack the target system owing to its static nature. This develops asymmetric warfare in which attackers outwit defenders. Moving target defense (MTD) technologies, which obfuscate the attack surface by modifying the main properties of the potential target system, have been gaining attention as an active cyber security technology. Particularly, network-based MTD (NMTD) technologies, which dynamically mutate the network configuration information, such as IP and ports of the potential target system, can dramatically increase the time required for an attacker to analyze the system. Therefore, this system defense technology has been actively researched. However, increasing the analysis complexity of the target system is limited in conventional NMTD because the variation of system properties (e.g., IP, port) that can be mutated is restricted by the system configuration environment. Therefore, there is a need for an MTD technique that effectively delays an attacker during the system analysis by increasing the variation of system properties. Additionally, in terms of practicality, minimizing the computational overhead arising by the MTD technology and solving the compatibility problem with existing communication protocols are critical issues that cannot be overlooked. In this study, we propose a technology called Ghost-MTD (gMTD). gMTD allows only the user who is aware of protocol mutation patterns to correctly communicate with the service modules of the server system through protocol mutation using the pre-shared one-time bit sequence. Otherwise, gMTD deceives the attackers who attempt to infiltrate the system by redirecting their messages to a decoy-hole module. The experimental results show that the proposed technology enables protocol mutation and validation with a very low performance overhead of only 3.28% to 4.97% using an m-bit (m ≥ 4) length one-time bit sequence and can be applied to real systems regardless of the specific communication protocols. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
19961073
Volume :
13
Issue :
8
Database :
Complementary Index
Journal :
Energies (19961073)
Publication Type :
Academic Journal
Accession number :
143077652
Full Text :
https://doi.org/10.3390/en13081883