An introduction to network address shuffling

作者: Guilin Cai , Baosheng Wang , Xiaofeng Wang , Yulei Yuan , Sudan Li

DOI: 10.1109/ICACT.2016.7423321

关键词: Network addressSynchronization (computer science)The InternetShufflingServerComputer scienceKey issuesComputer security

摘要: Moving Target Defense (MTD) has been proposed as a new revolutionary technology to alter the asymmetric situation between attacks and defenses. Network address shuffling is an important branch of MTD technology. However, there no systematic introduction network shuffling. In this paper, we present brief research achievements according two patterns which are identified defined by us. We then summarize analyze supporting techniques related features for each technique mentioned in paper. What's more, key issues implement effective mechanism discussed, with expectation invigorating subsequent research.

参考文章(19)
Yujing Liu, Wei Peng, Jinshu Su, A study of IP prefix hijacking in cloud computing networks Security and Communication Networks. ,vol. 7, pp. 2201- 2210 ,(2014) , 10.1002/SEC.738
Tian-Zuo Wang, Huai-Min Wang, Bo Liu, Bo Ding, Jing Zhang, Pei-Chang Shi, Further Analyzing the Sybil Attack in Mitigating Peer-to-Peer Botnets Ksii Transactions on Internet and Information Systems. ,vol. 6, pp. 2731- 2749 ,(2012) , 10.3837/TIIS.2012.10.017
Andrew Clark, Kun Sun, Radha Poovendran, Effectiveness of IP address randomization in decoy-based moving target defense conference on decision and control. pp. 678- 685 ,(2013) , 10.1109/CDC.2013.6759960
Jafar Haadi Jafarian, Ehab Al-Shaer, Qi Duan, Openflow random host mutation: transparent moving target defense using software defined networking acm special interest group on data communication. pp. 127- 132 ,(2012) , 10.1145/2342441.2342467
Fei Wang, Hailong Wang, Xiaofeng Wang, Jinshu Su, A new multistage approach to detect subtle DDoS attacks Mathematical and Computer Modelling. ,vol. 55, pp. 198- 213 ,(2012) , 10.1016/J.MCM.2011.02.025
Rui Zhuang, Scott A. DeLoach, Xinming Ou, Towards a Theory of Moving Target Defense Proceedings of the First ACM Workshop on Moving Target Defense. pp. 31- 40 ,(2014) , 10.1145/2663474.2663479
Matthew Dunlop, Stephen Groat, William Urbanski, Randy Marchany, Joseph Tront, None, MT6D: A Moving Target IPv6 Defense military communications conference. pp. 1321- 1326 ,(2011) , 10.1109/MILCOM.2011.6127486
Matthew Dunlop, Stephen Groat, William Urbanski, Randy Marchany, Joseph Tront, None, The Blind Man's Bluff Approach to Security Using IPv6 ieee symposium on security and privacy. ,vol. 10, pp. 35- 43 ,(2012) , 10.1109/MSP.2012.28
Justin Yackoski, Peng Xie, Harry Bullen, Jason Li, Kun Sun, A Self-shielding Dynamic Network Architecture military communications conference. pp. 1381- 1386 ,(2011) , 10.1109/MILCOM.2011.6127498
Douglas C. MacFarland, Craig A. Shue, The SDN Shuffle: Creating a Moving-Target Defense using Host-based Software-Defined Networking Proceedings of the Second ACM Workshop on Moving Target Defense. pp. 37- 41 ,(2015) , 10.1145/2808475.2808485