Tina Moghaddam, Minjune Kim, Jin-Hee Cho, Hyuk-Soon Lim, T. Moore, Frederica Free-Nelson, Dan Dongseong Kim
{"title":"A Practical Security Evaluation of a Moving Target Defence against Multi-Phase Cyberattacks","authors":"Tina Moghaddam, Minjune Kim, Jin-Hee Cho, Hyuk-Soon Lim, T. Moore, Frederica Free-Nelson, Dan Dongseong Kim","doi":"10.1109/dsn-w54100.2022.00026","DOIUrl":null,"url":null,"abstract":"Moving Target Defence (MTD) is a state-of-art defence mechanism as it proactively changes attack surfaces against cyberattacks. The theoretical security effectiveness of MTD techniques need to be validated with experimental evidence. Previous work in evaluating the effectiveness of virtual IP-shuffling MTD techniques mostly focused on the reconnaissance phase of cyberattacks, and used theoretical modelling or simulated and emulated networks to conduct the evaluation. These types of evaluations did not account for realistic network conditions or consider the effect on the attacker’s behaviour. In this paper, we present a practical evaluation of a virtual IP-shuffling MTD technique in a software define networking (SDN) testbed, with attacks based on the first three phases defined in the cyber kill chain, and consider a possible response by the attacker. This work considers two types of attackers: Dummy attacker and Adjusting attacker. A dummy attacker performs attacks consecutively with no knowledge or consideration about the MTD on the system, whereas an adjusting attacker is aware of the network using a time based MTD job management strategy and can adjust their approach accordingly. The effectiveness of attacks are analysed overall and across the three phases, and compared to the expectation. The results validate the effectiveness of the MTD technique, show its utility extends beyond just the reconnaissance phase, and demonstrate that the attacker can adjust their approach if they are aware of the MTD technique being used in order to increase their success rate.","PeriodicalId":349937,"journal":{"name":"2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/dsn-w54100.2022.00026","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Moving Target Defence (MTD) is a state-of-art defence mechanism as it proactively changes attack surfaces against cyberattacks. The theoretical security effectiveness of MTD techniques need to be validated with experimental evidence. Previous work in evaluating the effectiveness of virtual IP-shuffling MTD techniques mostly focused on the reconnaissance phase of cyberattacks, and used theoretical modelling or simulated and emulated networks to conduct the evaluation. These types of evaluations did not account for realistic network conditions or consider the effect on the attacker’s behaviour. In this paper, we present a practical evaluation of a virtual IP-shuffling MTD technique in a software define networking (SDN) testbed, with attacks based on the first three phases defined in the cyber kill chain, and consider a possible response by the attacker. This work considers two types of attackers: Dummy attacker and Adjusting attacker. A dummy attacker performs attacks consecutively with no knowledge or consideration about the MTD on the system, whereas an adjusting attacker is aware of the network using a time based MTD job management strategy and can adjust their approach accordingly. The effectiveness of attacks are analysed overall and across the three phases, and compared to the expectation. The results validate the effectiveness of the MTD technique, show its utility extends beyond just the reconnaissance phase, and demonstrate that the attacker can adjust their approach if they are aware of the MTD technique being used in order to increase their success rate.