Network infrastructure obfuscation

作者: Craig A. Schultz , Yadong Zhang , Johnson L. Wu , Eric Winsborrow , Steven M. Silva

DOI:

关键词: Distributed computingNetwork simulationHost (network)Virtual machineShadow (psychology)Software-defined networkingObfuscationEngineeringIntelligent computer networkSystem administrator

摘要: A shadow network, which can be a virtual reproduction of real, physical, base computer is described. Shadow networks duplicate the topology, services, host, and network traffic using hosts, are low interaction, minimal-resource-using host emulators. The connected to through switches, etc. in order form large obfuscated network. When hacker probes into emulator, more resource-intensive machine swapped take its place. connection attempted from emulator physical computer, step place software defined networking (SDN) prevent collisions between duplicated IP addresses. Replicating within introduces problems for hackers allows system administrator easier ways identify intrusions.

参考文章(27)
James Michael Ferris, Gerry Edward Riveros, Systems and methods for matching a usage history to a new cloud ,(2010)
Yoshio Turner, Jeongkeun Lee, Myung Jin Lee, Providing a virtual network topology in a data center ,(2012)
Uri Blumenthal, Omer Ben-Shalom, Network security elements using endpoint resources ,(2006)
Joel Alan Vickery, Christopher Dyson White, Chester Randolph Ratcliffe, Aaron Randal Moate, Marc Anthony Crawford, Ronald David Parker, John Christian Espinosa, Systems and methods for a simulated network attack generator ,(2009)
William Zietzke, Yoshiki Kano, Dan Ritchie, Robert Eugene Down, Method and apparatus of data center file system ,(2011)
Lundy M. Lewis, Michael P. Shevenell, Method and apparatus for the simulation of computer networks ,(2002)
James J. Bozek, Bruce A. Smith, James L. Wooldridge, Edward S. Suffern, Dynamically provisioning virtual machines ,(2009)