2017
DOI: 10.1109/tnsm.2017.2724239
|View full text |Cite
|
Sign up to set email alerts
|

Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

2
45
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 65 publications
(51 citation statements)
references
References 27 publications
2
45
0
Order By: Relevance
“…4) Network Topology Shuffling: The underlying idea of this technique is to invalidate an attacker's path information by continuously changing routes in networks. Achleitner et al [1,2] proposed a virtual topology generation framework against network scanning attacks by leveraging the SDN technology. Hong et al [68] presented an optimal network reconfiguration technique based on the concept of shufflingbased MTD for SDN environments.…”
Section: A Shufflingmentioning
confidence: 99%
See 1 more Smart Citation
“…4) Network Topology Shuffling: The underlying idea of this technique is to invalidate an attacker's path information by continuously changing routes in networks. Achleitner et al [1,2] proposed a virtual topology generation framework against network scanning attacks by leveraging the SDN technology. Hong et al [68] presented an optimal network reconfiguration technique based on the concept of shufflingbased MTD for SDN environments.…”
Section: A Shufflingmentioning
confidence: 99%
“…Main Attacks: Common attacks considered in SDN-based MTD approaches include reconnaissance (or scanning) attacks [31,66,69,78,79,85,138] and DDoS attacks [13,145], which can be countermeasured by using random IP mutation and/or network topology shuffling. Key Methodologies: The key idea of deploying MTD techniques in SDN environments is to highly leverage its centralized structure with an SDN controller to optimize the configuration of the deployed MTD techniques, such as IP randomization / shuffling [78,79,100,138,145], network routing paths [68], attack graphs / paths [31], port hopping [85], packet header randomization / obfuscation [143,156], or virtual topology generation [1]. The key concerns in developing SDNbased MTD are resolving a scalability issue in an attack graph [31] or IP shuffling [100] and optimizing both security and performance in terms of minimizing security vulnerabilities while minimizing defense cost and service interruptions to users.…”
Section: Software Defined Network (Sdns)mentioning
confidence: 99%
“…Besides the traditional scanning method, advance level attackers can analyze the statistics of round-trip time and measured bandwidth on links to find the inconsistency [44]. To make the real and fake network indistinguishable, we take a similar approach described in [44]. By adding artificial delay to certain packets, we change the link bandwidth and host delays.…”
Section: Delay Handlermentioning
confidence: 99%
“…The authors also proposed a mechanism to protect against such attacks. SDN based virtual topologies for countering the Reconnaissance attacks was proposed in [19]. The work also proposed mechanism for the identification of malicious nodes generating scanning through statistical information.…”
Section: Related Workmentioning
confidence: 99%