2017
DOI: 10.1371/journal.pone.0177111
|View full text |Cite
|
Sign up to set email alerts
|

Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks

Abstract: Network address shuffling is a novel moving target defense (MTD) that invalidates the address information collected by the attacker by dynamically changing or remapping the host’s network addresses. However, most network address shuffling methods are limited by the limited address space and rely on the host’s static domain name to map to its dynamic address; therefore these methods cannot effectively defend against random scanning attacks, and cannot defend against an attacker who knows the target’s domain nam… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 40 publications
0
11
0
Order By: Relevance
“…The paper [95] proposed an SDN-based technique that randomizes domain names and mutates network addresses to prevent attackers from using DNS query lists and the time window attack to find application servers. This system requires an authentication server, as well as DHCP and DNS servers deployed by the defender.…”
Section: Architectures Utilizing Multiple Mtd Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The paper [95] proposed an SDN-based technique that randomizes domain names and mutates network addresses to prevent attackers from using DNS query lists and the time window attack to find application servers. This system requires an authentication server, as well as DHCP and DNS servers deployed by the defender.…”
Section: Architectures Utilizing Multiple Mtd Methodsmentioning
confidence: 99%
“…However, even more of the articles surveyed have reached the emulation stage. The paper [93] was tested on a real network and [95] used a laboratory network to verify its architecture. OpenStack was used for [87] to make a small test environment out of three VMs.…”
Section: Testbedsmentioning
confidence: 99%
See 1 more Smart Citation
“…e μMT6D is designed to work on low-power and low-resource devices and can prevent targeted attacks through rotating the IPv6 address. Wang et al [12] proposed a network defense method based on random domain name and address mutation (RDAM). is method increases the scanning space of the attacker through a dynamic domain name method and reduces the probability that a host will be hit by an attacker scanning IP addresses.…”
Section: Related Workmentioning
confidence: 99%
“…Existing work on MTD has primarily focused on low-level attributes, such as instruction set randomization [4,13] and address space layout randomization [11,30]. Some other MTD methods target network-level features, such as IP address randomization [2,12], virtualizationbased MTD [26] and software-defined networking based MTD [19,34]. However, considering the security of communication protocols in IoT, these MTD methods cannot achieve desired defense diversity against potential attacks, as the low-level protocol properties to be mutated (e.g., IP addresses or port numbers) are minimal.…”
Section: Introductionmentioning
confidence: 99%