Network Topology Mutation as Moving Target Defense for Corporate Networks

The paper introduces a topology mutation – the novel concept in Moving Target Defense (MTD). MTD is a new technique that represents a significant shift in cyber defense. Traditional cybersecurity techniques have primarily focused on the passive defense of static networks only. In MTD approach cyber attackers are confused by making the attack surface dynamic, and thus harder to probe and infiltrate. The emergence of Network Function s Virtualization (NFV) and Software-Defined Networking (SDN) technology has opened up new possibilities in network architecture management. The application of combined NFV and SDN technologies provides a unique platform for implementing MTD techniques for securing the network infrastructure by morphing the logical view of the network topology.

[1]  Jeannette M. Wing,et al.  An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.

[2]  Ratul Mahajan,et al.  Measuring ISP topologies with rocketfuel , 2002, TNET.

[3]  Dijiang Huang,et al.  SDN and NFV , 2018, Software-Defined Networking and Security.

[4]  Patrick McDaniel,et al.  Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies , 2017, IEEE Transactions on Network and Service Management.

[5]  Ehab Al-Shaer,et al.  Efficient Random Route Mutation considering flow and network constraints , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[6]  John A. Clark,et al.  Networking Recon: Network reconnaissance , 2008 .

[7]  Qi Zhao,et al.  A decoy chain deployment method based on SDN and NFV against penetration attack , 2017, PloS one.

[8]  Li-Der Chou,et al.  SDN/NFV-Based Moving Target DDoS Defense Mechanism , 2018 .

[9]  Kemal Akkaya,et al.  A moving target defense and network forensics framework for ISP networks using SDN and NFV , 2019, Future Gener. Comput. Syst..

[10]  Bryan C. Ward,et al.  Survey of Cyber Moving Targets Second Edition , 2018 .

[11]  Naoaki Yamanaka,et al.  Network Function Virtualization: A Survey , 2017, IEICE Trans. Commun..

[12]  Angelos Stavrou,et al.  MOTAG: Moving Target Defense against Internet Denial of Service Attacks , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).

[13]  Eric Michael Hutchins,et al.  Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .

[14]  Ehab Al-Shaer,et al.  Random Host Mutation for Moving Target Defense , 2012, SecureComm.

[15]  Scott A. DeLoach,et al.  Towards a Theory of Moving Target Defense , 2014, MTD '14.

[16]  Georgios Xilouris,et al.  SHIELD: A novel NFV-based cybersecurity framework , 2017, 2017 IEEE Conference on Network Softwarization (NetSoft).

[17]  D. Kewley,et al.  Dynamic approaches to thwart adversary intelligence gathering , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.