A Survey of Moving Target Defenses for Network Security

05/02/2019
by   Sailik Sengupta, et al.
0

Network defense techniques based on traditional tools, techniques, and procedures fail to account for the attacker's inherent advantage present due to the static nature of network services and configurations. Moving Target Defense (MTD), on the other hand, provides an intelligent countermeasure by dynamically re-configuring the underlying systems, thereby reducing the effectiveness of cyber attacks. In this survey, we analyze the recent advancements made in the development of MTDs and highlight how these defenses can be made more effective with the use of artificial intelligence techniques for decision making. We first define a unified formal notation for MTDs that can capture different aspects of such defenses. We then categorize these defenses into different sub-classes depending on how they answer the three questions -- what to move, when to move and how to move -- showcasing how game-theoretic strategies can effectively answer the latter question. To understand the usefulness of these defense methods, we study the implementation of such MTD techniques. We find that new networking technologies such as Software Defined Networking and Network Function Virtualization provide effective means for implementing these dynamic defense methods. To encourage researchers and industry experts in using such defenses, we highlight industry use-cases and discuss the practicality and maturity of these defenses. To aid readers who want to test or deploy MTD techniques, we highlight existing MTD test-beds. Our survey then performs both a qualitative and quantitative analysis to better understand the effectiveness of these MTDs in terms of security and performance. To that extent, we use well-defined metrics for measuring performance costs and security impacts of the surveyed MTDs. Finally, we conclude by summarizing research opportunities that our survey elucidates.

READ FULL TEXT
research
02/27/2023

Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators

It is becoming increasingly imperative to design robust ML defenses. How...
research
11/24/2021

WFDefProxy: Modularly Implementing and Empirically Evaluating Website Fingerprinting Defenses

Tor, an onion-routing anonymity network, has been shown to be vulnerable...
research
03/21/2019

From Cyber-Security Deception To Manipulation and Gratification Through Gamification

With the ever growing networking capabilities and services offered to us...
research
03/25/2019

A cost-effective shuffling method against DDoS attacks using Moving Target Defense

Moving Target Defense(MTD) has emerged as a good solution to alter the a...
research
01/09/2018

A Survey among Network Operators on BGP Prefix Hijacking

BGP prefix hijacking is a threat to Internet operators and users. Severa...
research
07/17/2023

Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools

Provenance-Based Endpoint Detection and Response (P-EDR) systems are dee...
research
07/21/2021

Challenges in cybersecurity: Lessons from biological defense systems

We explore the commonalities between methods for assuring the security o...

Please sign up or login with your details

Forgot password? Click here to reset