Affiliation:
1. School of Electronics and Communication Engineering, Sun Yat-sen University, Shenzhen 518107, China
Abstract
Traditional network defense approaches are insufficient to deal with new types of network threats. Active defense approaches based on software-defined networks helps to solve this problem, which includes random port-hopping technology. Existing port-hopping approaches have problems such as the inability to completely hide the service port and the complicated hopping mechanism. What is more, there is no strict demonstration of the security effectiveness evaluation of random port hopping and its influencing factors. In this paper, a hidden services port-hopping approach and several models are proposed to solve these existing problems. Firstly, the algorithm, protocol, and flow update process of the method are presented. Secondly, according to the conceptual model of network attack and the network attack and defense model, the mathematical model of network attack is proposed to evaluate the security effectiveness of random port hopping. Furthermore, the resource layer and attack surface are redefined and the conceptual model of random port hopping is proposed to reveal the security mechanism of random port hopping more figuratively. After that, the factors that influence the security effectiveness of random port hopping are analyzed. Finally, both experiments and theoretical analysis show that hidden services port hopping is an effective active defense technology and the factors that influence the probability of a successful attack include the time interval of port hopping, the size of port-hopping space, and the number of vulnerable ports.
Funder
Natural Science Foundation of Guangdong Province
Shenzhen Science and Technology Program
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Hardware and Architecture,Signal Processing,Control and Systems Engineering
Reference31 articles.
1. A Secure Multiuser Privacy Technique for Wireless IoT Networks Using Stochastic Privacy Optimization;Anajemba;IEEE Internet Things J.,2022
2. Anajemba, J.H., Tang, Y., Iwendi, C., Ohwoekevwo, A., Srivastava, G., and Jo, O. (2020). Realizing Efficient Security and Privacy in IoT Networks. Sens. Rev., 20.
3. Moving target defense techniques: A survey;Lei;Secur. Commun. Netw.,2018
4. A survey on the moving target defense strategies: An architectural perspective;Zheng;J. Comput. Sci. Technol.,2019
5. Moving target defense: State of the art and characteristics;Cai;Front. Inf. Technol. Electron. Eng.,2016
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献