Proceedings of the 2016 ACM Workshop on Moving Target Defense 2016
DOI: 10.1145/2995272.2995278
|View full text |Cite
|
Sign up to set email alerts
|

Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 16 publications
0
7
0
Order By: Relevance
“…The traffic deception module on the moving server shares the characteristics of the outbound traffic, which are imitated by the traffic generator module on the decoy server to generate similar traffic with decoy processes on the client. Besides, The decoy connection and traffic injection in [155] similar to [156], OS fingerprint mutation is also applied on all servers so that the attack surface is further obfuscated. The SDN based CHAOS system (see Figure 11) in [157] obfuscates the network attack surface by using honeypot (i.e., decoy servers), honeytoken (i.e, fake response to port scanning), and MTD (i.e, random host mutation) techniques.…”
Section: A Deception In Depthmentioning
confidence: 99%
See 1 more Smart Citation
“…The traffic deception module on the moving server shares the characteristics of the outbound traffic, which are imitated by the traffic generator module on the decoy server to generate similar traffic with decoy processes on the client. Besides, The decoy connection and traffic injection in [155] similar to [156], OS fingerprint mutation is also applied on all servers so that the attack surface is further obfuscated. The SDN based CHAOS system (see Figure 11) in [157] obfuscates the network attack surface by using honeypot (i.e., decoy servers), honeytoken (i.e, fake response to port scanning), and MTD (i.e, random host mutation) techniques.…”
Section: A Deception In Depthmentioning
confidence: 99%
“…HT: [68], [88] HT: HT: MTD: [123], [125] MTD: [133], [134] MTD: MTD: Exploitation HP: [77], [167] HP: [55]- [61], [67], [153], [155], [156], [159], [160] HP: [54] HP:…”
Section: B Deception Lifecyclementioning
confidence: 99%
“…Typical examples of MTD research are openflow-random host mutation (OF-RHM) and random host mutation (RHM), which undertake network address mutation operations using SDN(Software Defined Networking) and legacy network operations with the use of virtual IPs [9,10]. HIDE (Host IDEntify anonymization) is an MTD technology that uses a honeypot cloud based on RHM and adds the concepts of fingerprint mutation and decoy node operation [11]. Moving target IPv6 defense (MT6D) is a technology for generating addresses using a cryptographic algorithm with timestamps in an IPv6-based network environment [12].…”
Section: Related Workmentioning
confidence: 99%
“…Duan et al [5] combine dynamic rotation, diversification, and honeypot technology to improve the effectiveness of cyber deception. Jafarian et al [6] employ IP/MAC addresses, service ports, service names, exploitable vulnerabilities, and others as host identity fingerprints. Then they propose an anonymous active defense system HIDE to continuously change the host's fingerprint.…”
Section: Introductionmentioning
confidence: 99%