A zoning algorithm for dynamic cyber zone defense

Attacks on cyber systems continue to plague public and private sector enterprises. While cyber zone defense is an appealing strategy to prevent, disrupt and tolerate these attacks, existing approaches assign hosts to zones based on their function (for example, printer zones and sensor zones) or place in the architecture (for example, corporate zones and demilitarized zones). This leaves the large number of human-operated commodity workstations within an enterprise unaddressed. We propose a dynamic zoning algorithm which periodically or asynchronously assigns hosts to zones based on peer requests made by their human operators. The proposed algorithm runs quickly on basic hardware for a large enterprise, and the zone statistics converge to values that match what simple mathematical models predict. We conclude that dynamic cyber zone defense calls for additional research and is a candidate for technology transfer.

[1]  Brian P. Van Leeuwen,et al.  Operational cost of deploying Moving Target Defenses defensive work factors , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[2]  Patrick D. McDaniel,et al.  Adaptive protocol switching using Dynamically Insertable Bumps in the stack , 2015, MILCOM 2015 - 2015 IEEE Military Communications Conference.

[3]  Robert Mitchell,et al.  Foundations for Cyber Zone Defense , 2016, 2016 25th International Conference on Computer Communication and Networks (ICCCN).

[4]  Ehab Al-Shaer,et al.  Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.

[5]  Ehab Al-Shaer,et al.  Toward Network Configuration Randomization for Moving Target Defense , 2011, Moving Target Defense.

[6]  Asif Effendi,et al.  ICS and IT: Managing Cyber Security Across the Enterprise , 2015 .

[7]  Kaliappa Nadar Ravindran Management Software for Protocol-level Adaptations in Dependable Network Services , 2016, 2016 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW).

[8]  Mitchell Robert,et al.  Refining the Foundations for Cyber Zone Defense , 2016 .

[9]  Scott A. DeLoach,et al.  Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense | NIST , 2012 .

[10]  Chaojing Tang,et al.  A new dynamic address solution for moving target defense , 2016, 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference.

[11]  Harry G. Perros,et al.  SDN-based solutions for Moving Target Defense network protection , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[12]  Ing-Ray Chen,et al.  Parameterizing Moving Target Defenses , 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS).

[13]  William W. Streilein,et al.  Survey of Cyber Moving Target Techniques , 2013 .