A Port-Hopping Technology against Remote Attacks and Its Effectiveness Evaluation
Abstract
:1. Introduction
- (1)
- The update mechanism of flow entries is optimized to ensure the continuity of communication.
- (2)
- The formula of network security effectiveness evaluation parameters of HSPH is derived through the mathematical model of network attack.
- (3)
- The security defense mechanism of random port hopping is intuitively described through the proposed dynamic rope-threading model.
- (4)
- The factors that influence the security effectiveness of random port hopping are obtained through quantitative analysis of network security effectiveness evaluation parameters.
- (5)
- An experimental network of HSPH has been built and deployed to verify the correctness of the theoretical analysis.
2. Related Work
3. HSPH: Hidden Service Port Hopping
3.1. Port-Hopping Space
3.2. HSPH Algorithm in SDN Controller
Algorithm 1 POX controller algorithm. |
|
3.3. HSPH Protocol
3.3.1. The Communication between Client and Server
3.3.2. Flow Entries Update
- (1)
- When Client1 initiates communication with Server1, the controller sends flow tables along OF Switch A, OF Switch B, and OF Switch C according to the routing calculation results.
- (2)
- When a hopping interval is reached, the controller sends a new flow table to OF Switch B and OF Switch C, and then sends a modification instruction to modify the old flow entries in OF Switch A as new flow entries.
- (3)
- When the maximum communication delay between Client1 and Server1 is reached, the controller sends an instruction to delete the old flow entries in OF Switch B and OF Switch C in turn.
4. Model
4.1. Mathematical Model of Network Attack
4.1.1. Conceptual Model of Network Attack
4.1.2. Network Attack and Defense Model
4.1.3. Network Security Effectiveness Evaluation Parameters
4.1.4. Analyzed Scenarios
- (a)
- Static Port
- (b)
- Random Port Hopping
- (1)
- (2)
- (3)
- (4)
- (5)
4.2. Conceptual Model of Random Port Hopping
- (1)
- Transfer of holes. As shown in Figure 5b, when other conditions remain unchanged, the transfer of holes on the hard panel will reduce the probability of successful rope threading in a unit of time. The speed of hole transfer affects the probability of successful rope threading. In particular, rope threading must fail when the holes are transferred on the hard panel faster than one rope threading attempt.
- (2)
- Hard panel extension. As shown in Figure 5c, when other conditions remain unchanged, increasing the area of the hard panel reduces the probability of successful rope threading in a unit of time.
- (3)
- Reduce the number of holes. As shown in Figure 5d, when other conditions remain unchanged, reducing the number of holes reduces the probability of successful rope threading in a unit of time.
5. Deployment and Simulation Experiment
5.1. Simulation Experiment
5.2. Effectiveness Analysis
5.2.1. The Time Interval of Random Port Hopping ()
- (1)
- (2)
- (3)
5.2.2. The Size of the Port-Hopping Space ()
- (1)
- (2)
- (3)
5.2.3. The Number of Vulnerable Service Ports ()
- (1)
- (2)
5.3. Performance Analysis
5.3.1. Evaluation of Data Transmission Time
5.3.2. Overhead of CPU
6. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Anajemba, J.H.; Yue, T.; Iwendi, C.; Chatterjee, P.; Ngabo, D.; Alnumay, W.S. A Secure Multiuser Privacy Technique for Wireless IoT Networks Using Stochastic Privacy Optimization. IEEE Internet Things J. 2022, 9, 2566–2577. [Google Scholar] [CrossRef]
- Anajemba, J.H.; Tang, Y.; Iwendi, C.; Ohwoekevwo, A.; Srivastava, G.; Jo, O. Realizing Efficient Security and Privacy in IoT Networks. Sens. Rev. 2020, 20, 2609. [Google Scholar] [CrossRef] [PubMed]
- Lei, C.; Zhang, H.Q.; Tan, J.L.; Zhang, Y.C.; Liu, X.H. Moving target defense techniques: A survey. Secur. Commun. Netw. 2018, 2018, 3759626. [Google Scholar] [CrossRef]
- Zheng, J.; Namin, A.S. A survey on the moving target defense strategies: An architectural perspective. J. Comput. Sci. Technol. 2019, 34, 207–233. [Google Scholar] [CrossRef]
- Cai, G.L.; Wang, B.S.; Hu, W.; Wang, T.Z. Moving target defense: State of the art and characteristics. Front. Inf. Technol. Electron. Eng. 2016, 17, 1122–1153. [Google Scholar] [CrossRef]
- Cho, J.H.; Sharma, D.P.; Alavizadeh, H.; Yoon, S.; Ben-Asher, N.; Moore, T.J.; Kim, D.S.; Lim, H.; Nelson, F.F. Toward proactive, adaptive defense: A survey on moving target defense. IEEE Commun. Surv. Tutor. 2020, 22, 709–745. [Google Scholar] [CrossRef]
- Sengupta, S.; Chowdhary, A.; Sabur, A.; Alshamrani, A.; Huang, D.; Kambhampati, S. A survey of moving target defenses for network security. IEEE Commun. Surv. Tutor. 2020, 22, 1909–1941. [Google Scholar] [CrossRef]
- Lee, H.C.; Thing, V.L. Port hopping for resilient networks. In Proceedings of the IEEE 60th Vehicular Technology Conference, Los Angeles, CA, USA, 26–29 September 2004; VTC2004-Fall 2004. IEEE: Piscataway, NJ, USA, 2004; Volume 5, pp. 3291–3295. [Google Scholar]
- Luo, Y.B.; Wang, B.S.; Wang, X.F.; Hu, X.F.; Cai, G.L. TPAH: A universal and multi-platform deployable port and address hopping mechanism. In Proceedings of the 2015 International Conference on Information and Communications Technologies (ICT 2015), Xi’an, China, 24–26 April 2015. [Google Scholar]
- Chavez, A.R.; Stout, W.M.; Peisert, S. Techniques for the dynamic randomization of network attributes. In Proceedings of the 2015 International Carnahan Conference on Security Technology (ICCST), Taipei, Taiwan, 21–24 September 2015; IEEE: Pisvataway, NJ, USA, 2015; pp. 1–6. [Google Scholar]
- Badishi, G.; Herzberg, A.; Keidar, I. Keeping denial-of-service attackers in the dark. IEEE Trans. Dependable Secur. Comput. 2007, 4, 191–204. [Google Scholar] [CrossRef]
- Badishi, G.; Herzberg, A.; Keidar, I. Keeping denial-of-service attackers in the dark. In Proceedings of the Distributed Computing: 19th International Conference, DISC 2005, Cracow, Poland, 26–29 September 2005; Proceedings 19. Springer: Berlin, Germany, 2005; pp. 18–32. [Google Scholar]
- Barrere, M.; Badonnel, R.; Festor, O. Vulnerability assessment in autonomic networks and services: A survey. IEEE Commun. Surv. Tutor. 2013, 16, 988–1004. [Google Scholar] [CrossRef]
- Wang, J.; Fan, K.; Mo, W.; Xu, D. A method for information security risk assessment based on the dynamic bayesian network. In Proceedings of the 2016 International Conference on Networking and Network Applications (NaNA), Hakodate, Japan, 23–25 July 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 279–283. [Google Scholar]
- Kumar, S.; Negi, A.; Prasad, K.; Mahanti, A. Evaluation of network risk using attack graph based security metrics. In Proceedings of the 2016 IEEE 14th International Conference on Dependable, Autonomic and Secure Computing, 14th International Conference on Pervasive Intelligence and Computing, 2nd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), Auckland, New Zealand, 8–12 August 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 91–93. [Google Scholar]
- Yan, J.; Zhou, Y.; Qin, G.; Wang, T.; Bin, R. A Hidden Services Port Hopping Approach for Moving Target Defense. In Proceedings of the ISCTT 2022 7th International Conference on Information Science, Computer Technology and Transportation, Xishuangbanna, China, 27–29 May 2022; pp. 1–5. [Google Scholar]
- Hari, K.; Dohi, T. Sensitivity analysis of random port hopping. In Proceedings of the 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing, Xi’an, China, 26–29 October 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 316–321. [Google Scholar]
- Lin, K.; Jia, C.; Weng, C. Distributed timestamp synchronization for end hopping. China Commun. 2011, 8, 164–169. [Google Scholar]
- Shi, L.; Jia, C.; Lü, S.; Liu, Z. Port and address hopping for active cyber-defense. In Proceedings of the Intelligence and Security Informatics: Pacific Asia Workshop, PAISI 2007, Chengdu, China, 11–12 April 2007; Springer: Berlin, Germany, 2007; pp. 295–300. [Google Scholar]
- Zhang, L.; Guo, Y.; Yuwen, H.; Wang, Y. A port hopping based DoS mitigation scheme in SDN network. In Proceedings of the 2016 12th International Conference on Computational Intelligence and Security (CIS), Wuxi, China, 16–19 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 314–317. [Google Scholar]
- Sharma, D.P.; Cho, J.H.; Moore, T.J.; Nelson, F.F.; Lim, H.; Kim, D.S. Random host and service multiplexing for moving target defense in software-defined networks. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar]
- Yoon, S.; Cho, J.H.; Kim, D.S.; Moore, T.J.; Free-Nelson, F.; Lim, H. Attack graph-based moving target defense in software-defined networks. IEEE Trans. Netw. Serv. Manag. 2020, 17, 1653–1668. [Google Scholar] [CrossRef]
- Zhang, L.; Wang, Z.; Gu, K.; Miao, F.; Guo, Y. Transparent synchronization based port mutation scheme in SDN network. In Proceedings of the 2016 5th International Conference on Computer Science and Network Technology (ICCSNT), Changchun, China, 10–11 December 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 581–585. [Google Scholar]
- Luo, Y.B.; Wang, B.S.; Wang, X.F.; Hu, X.F.; Cai, G.L.; Sun, H. RPAH: Random port and address hopping for thwarting internal and external adversaries. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015; IEEE: Piscataway, NJ, USA, 2015; Volume 1, pp. 263–270. [Google Scholar]
- Howard, M.; Pincus, J.; Wing, J.M. Measuring Relative Attack Surfaces; Springer: Berlin, Germany, 2005. [Google Scholar]
- Zhuang, R.; Zhang, S.; DeLoach, S.A.; Ou, X.; Singhal, A. Simulation-based approaches to studying effectiveness of moving-target network defense. In Proceedings of the National Symposium on Moving Target Research, Annapolis, MD, USA, 11 June 2012; Citeseer: Princeton, NJ, USA, 2012; Volume 246. [Google Scholar]
- Peng, W.; Li, F.; Huang, C.T.; Zou, X. A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 804–809. [Google Scholar]
- Bopche, G.S.; Mehtre, B.M. Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks. Comput. Secur. 2017, 64, 16–43. [Google Scholar] [CrossRef]
- Luo, Y.B.; Wang, B.S.; Cai, G.L. Analysis of port hopping for proactive cyber defense. Int. J. Secur. Its Appl. 2015, 9, 123–134. [Google Scholar] [CrossRef]
- Patel, R.; Patel, P.; Shah, P.; Patel, B.; Garg, D. Software Defined Network (SDN) Implementation with POX Controller. In Proceedings of the 2022 3rd International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 20–22 October 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 65–70. [Google Scholar]
- De Oliveira, R.L.S.; Schweitzer, C.M.; Shinoda, A.A.; Prete, L.R. Using mininet for emulation and prototyping software-defined networks. In Proceedings of the 2014 IEEE Colombian conference on communications and computing (COLCOM), Bogota, Colombia, 4–6 June 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 1–6. [Google Scholar]
Parameter | Description |
---|---|
The number of hosts in the network | |
The size of address space | |
The number of open ports in the network | |
The size of the port-hopping space | |
The number of tasks that an attacker can complete in one reconnaissance or fingerprint, | |
The number of vulnerable service port in the whole network | |
The time interval of random port hopping | |
The time required to reconnaissance a single address | |
The time required to fingerprint a service port | |
The time required for vulnerability analysis | |
The time required for attack execution |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yan, J.; Zhou, Y.; Wang, T. A Port-Hopping Technology against Remote Attacks and Its Effectiveness Evaluation. Electronics 2023, 12, 2477. https://doi.org/10.3390/electronics12112477
Yan J, Zhou Y, Wang T. A Port-Hopping Technology against Remote Attacks and Its Effectiveness Evaluation. Electronics. 2023; 12(11):2477. https://doi.org/10.3390/electronics12112477
Chicago/Turabian StyleYan, Jiajun, Ying Zhou, and Tao Wang. 2023. "A Port-Hopping Technology against Remote Attacks and Its Effectiveness Evaluation" Electronics 12, no. 11: 2477. https://doi.org/10.3390/electronics12112477
APA StyleYan, J., Zhou, Y., & Wang, T. (2023). A Port-Hopping Technology against Remote Attacks and Its Effectiveness Evaluation. Electronics, 12(11), 2477. https://doi.org/10.3390/electronics12112477