Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks Conference

Aydeger, A, Saputro, N, Akkaya, K. (2018). Utilizing NFV for Effective Moving Target Defense Against Link Flooding Reconnaissance Attacks . 2019-October 946-951. 10.1109/MILCOM.2018.8599803

cited authors

  • Aydeger, A; Saputro, N; Akkaya, K

authors

abstract

  • Moving target defense (MTD) is becoming popular with the advancements in Software Defined Networking (SDN) technologies. With centralized management through SDN, changing the network attributes such as routes to escape from attacks is simple and fast. Yet, the available alternate routes are bounded by the network topology, and a persistent attacker that continuously perform the reconnaissance can extract the whole link-map of the network. To address this issue, we propose to use virtual shadow networks (VSNs) by applying Network Function Virtualization (NFV) abilities to the network in order to deceive attacker with the fake topology information and not reveal the actual network topology and characteristics. We design this approach under a formal framework for Internet Service Provider (ISP) networks and apply it to the recently emerged indirect DDoS attacks, namely Crossfire, for evaluation. The results show that attacker spends more time to figure out the network behavior while the costs on the defender and network operations are negligible until reaching a certain network size.

publication date

  • July 2, 2018

Digital Object Identifier (DOI)

International Standard Book Number (ISBN) 13

start page

  • 946

end page

  • 951

volume

  • 2019-October