Moving Target Defense for Cloud Infrastructures: Lessons from Botnets

作者: Wei Peng , Feng Li , Xukai Zou

DOI: 10.1007/978-1-4614-3296-8_2

关键词:

摘要: While providing elasticity to clients through on-demand service and cost-effectiveness providers efficient resource allocation, current cloud infrastructures are largely homogeneously statically configured for ease of administration. This leaves ample opportunities attackers reconnoiter penetrate the security perimeter services. chapter (1) explores evolution in botnet technologies from early static architectures recent dynamic resilient that employ various moving target defense (MTD) techniques circumvent crackdowns, (2) draws lessons botnets identifying challenges proposed solutions MTD infrastructures, which infrastructure configuration constantly evolves confuse without significantly degrading quality service. Proposed may increase cost potential by complicating attack process limiting exposure network vulnerability order make more against novel persistent attacks.

参考文章(97)
David Dagon, Cliff Changchun Zou, Wenke Lee, Modeling Botnet Propagation Using Time Zones. network and distributed system security symposium. ,(2006)
Matthew Van Gundy, Giovanni Vigna, Davide Balzarotti, Catch me, if you can: evading network signatures with web-based polymorphic worms WOOT '07 Proceedings of the first USENIX workshop on Offensive Technologies. pp. 7- ,(2007)
Chris Nunnery, Brent ByungHoon Kang, Greg Sinclair, Tumbling down the rabbit hole: exploring the idiosyncrasies of botmaster systems in a multi-tier botnet infrastructure usenix conference on large scale exploits and emergent threats. pp. 1- 1 ,(2010)
David Dagon, Chris Nunnery, Vikram Sharma, Brent ByungHoon Kang, Julian B. Grizzard, Peer-to-peer botnets: overview and case study conference on workshop on hot topics in understanding botnets. pp. 1- 1 ,(2007)
Fabian Monrose, Jay Zarfoss, Moheeb Abu Rajab, Andreas Terzis, My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging conference on workshop on hot topics in understanding botnets. pp. 5- 5 ,(2007)
Shahed Latif, Tim Mather, Subra Kumaraswamy, Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance ,(2009)
Jianwei Zhuge, Jinpeng Guo, Xinhui Han, Thorsten Holz, Wei Zou, Characterizing the IRC-based Botnet Phenomenon ,(2007)
Ping Wang, Baber Aslam, Cliff C. Zou, Peer-to-Peer Botnets Handbook of Information and Communication Security. pp. 335- 350 ,(2010) , 10.1007/978-3-642-04117-4_18
Roberto Perdisci, David Dagon, Yacin Nadji, Manos Antonakakis, Nikolaos Vasiloglou, Wenke Lee, Saeed Abu-Nimeh, From throw-away traffic to bots: detecting the rise of DGA-based malware usenix security symposium. pp. 24- 24 ,(2012)