Keywords

1 Introduction

In current network environment, the static nature of network configuration makes it easy for attackers to detect the target system and find only a single exploitable bug to successfully implement intrusion. Specifically, static and fixed IP address allows network scanners to aggregate information in order to construct an accurate and persistent maps of the network. The unvarying nature of this network topology enables adversaries to collaboratively share and reuse their collected reconnaissance information in order to launch a larger attack. In the security battle, time is on the attackers side. Attackers have time to study targeted network to determine potential vulnerabilities and choose the time of attack to cause maximal impact. Once attackers attack and breach a system, they can maintain illegal access privileges for extended periods of time without being detected.

In the opposite, it is difficult for the defender to block all the vulnerabilities and filter all attacks in the case of IT system becoming increasingly complex. Although heavily secured perimeter firewalls and intrusion detection systems are deployed to protect the network from outside attackers, in practice they are not effective for Zero-day attack and Advanced Persistent Threats (APT), and can be avoided by skilled attackers. Without awareness of private information of the opponent, the defender may use static protection mechanisms and spend substantial effort to protect an asset which may not be the target of the attacker.

Moving target defense (MTD) has been proposed to change the game by wresting the advantage from the attacker because it eliminates the availability of constant or slowly-changing vulnerability windows that allow attackers to lie in wait and conduct useful experiments on persistent vulnerabilities [1]. Its purpose is to provide a dynamic, non-deterministic and non-sustained runtime environment [2]. Network MTD (NMTD) breaks the dependency requirements of the attack chains to the deterministic and consistency of network environment by multi-level dynamical changes [4]. As one of the hot spots of NMTD, end-point hopping is one of the effective mechanisms [5, 6] to mitigate network attacks.

Although lots of hopping methods have been proposed [7,8,9,10,11, 13], existing mechanisms lack the ability to adapt to different reconnaissance strategies, which leads the network defense to blindness. To summarize, there are two major problems in existing end-point hopping researches. First, the benefits from hopping defense decrease due to the inadequate dynamic of network hopping, caused by self-learning insufficiency in reconnaissance attack strategy, leading to the blindness of hopping mechanism selection. Second, due to the limited network resources and high overhead, the availability of hopping mechanism is poor.

To address the above problems, Network Moving Target Defense based on Self-adaptive End-point Hopping Technique (SEHT) is proposed. The key contributions of this paper can be shown in the following aspects:

  1. (1)

    Directed to the lack of self-adaptive to scanning attack of existing hopping mechanism, hopping trigger based on adversary strategy awareness is designed. It uses hypothesis tests to analyze scanning attack strategy, and guides the choice of hopping strategy, which enhances the defense benefit.

  2. (2)

    Aimed at limited network resources and high hopping overhead, end-point hopping based on satisfiability modulo theories is proposed. It uses satisfiability modulo theories (SMT) [18] to formally describe the constraints of hopping, so as to ensure the low-overhead of hopping, which increase the availability of hopping mechanism.

2 Background and Related Works

2.1 Category of Network Scanning Attacks

Network scanning is a kind of network reconnaissance technique by means of sending probe packets to selected end-point space range [19]. With different scanning technique constantly springs up, network scanning attack improves its efficiency based on the network structural characteristics and knowledge gained [20]. Accordingly, scanning attack strategy can be classified into three types: blind scanning, half-blind scanning and follow-up scanning:

  1. (1)

    Blind scanning strategy: It is used when an attacker has to scan the entire active end-point. Since the structure of existing network information system has the characteristic of certainty and the static, attackers adopt blind scanning strategy so as to improve its efficiency by evenly scanning without repetition [21].

  2. (2)

    Half-blind scanning strategy: It is used when an attacker knows the node distribution of the selected range of end-point information to scan. Half-blind scanning strategy is adopted so as to achieve higher success rate by unevenly scanning with repetition [22].

  3. (3)

    Follow-up scanning strategy: It is directed at network systems implementing NMTD mechanisms When knowing the node distribution and the use of mutation mechanism, attackers try to obtain the mutation pattern of end-points by spatial compression and scanning frequency change. Based on it, follow-up scanning strategy is adopted so as to follow the hopping of specific end-point by uneven scanning with changeable frequency [23].

The reason to discriminate scanning attack strategy is that network scanning is used as a precondition technique the initial phase of attacks, which plays an important role in network attacks [3, 4]. Therefore, this paper discriminates scanning strategy by analyzing behavior characteristic of different scanning strategies, which achieves self-adaptive end-point hopping.

2.2 Research Works About MTD Hopping

In traditional network architecture, Atighetchi et al. [7] proposed a hopping mechanism using false IP and port information to confuse scanning attack during net-flow exchange. Lee and Thing [8] proposed a random port hopping mechanism, which calculates next hopping end-point information to evade scanning attack by using pseudo-random function or shared secret key, but the method is vulnerable to network delay interference. MT6D [9] uses large IPv6 address space property to implement end-point information hopping so as to increase the unpredictability. Hari and Dohi [10] introduced a discrete Markov chain based on RPH so as to improve the success rate among communication parties. Lin et al. [11] proposed a novel synchronization method by additionally opening the corresponding end-point information of the previous and the after hopping period. HOPERAA algorithm was designed in [12], eliminating the influence of linear clock drift on hopping synchronization. The drawback of these methods is hard to implement on network.

Software defined networking (SDN) [13] with the feature of logic control plane being separate from data transfer plane has brought a new solution of effective collaborative management in distributed routing. For that, end-point hopping based on SDN can change hopping period and hopping rules dynamically. NASR [14] prevents connection requests not within the service period by using address transition of packet header and the update of flow table based on DHCP update. SDNA [15] confuses scanning attackers by virtual hopping, which deploys a hypervisor node in each subnet to ensure hopping consistency. OF-RHM [16] proposed virtual end-point mapping mechanism based on Openflow [13]. It converts real IP to virtual IP so as to implement end-point hopping. However, since OF-RHM only implements space hopping, attackers can improve success rate of scanning attack by changing scanning frequency. To address this problem, Jafarian et al. [17] proposed ST-RHM hopping mechanism, which can resist cooperative scanning attack effectively by using temporal-spatial mixed hopping based on SDN. Because of the double hopping in spatial and temporal hopping, it leads to the increase of overhead and the loss of service.

In the rest of this paper, we will give the detail of Self-adaptive End-point Hopping Technique (SEHT) to solve these problems mentioned above. The main notions used in this paper are given below (Table 1).

Table 1. The main notions used in this paper

3 The Mechanism of Self-adaptive End-Point Hopping

End-point hopping is shown in Fig. 1, it tricks, evades and prevents scanning attack by changing network configuration, such as IP address and port, and status dynamically. Therefore, it increases the usage difficulty of vulnerabilities and backdoors so as to ensure the security of targeted systems. Existing end-point hopping mechanisms mainly adopt random hopping strategy [14, 16].

As is shown in solid part in Fig. 1, hopping configuration manager is used to configure end-point hopping on the basis of security objectives. After that, hopping implementation engine is used to implement end-point hopping. However, since random hopping is lack of offensive and defensive situational awareness, the effectiveness and availability of end-point hopping is limited.

Self-adaptive end-point hopping adds analysis engine and hopping trigger engine based on random hopping. Analysis engine is used to perceive and analyze network system security status. According to it, different hopping strategies are triggered in hopping trigger engine which based on adversary strategy awareness, and end-point hopping constraints are generated consequently.

Fig. 1.
figure 1

Traditional hopping V.S self-adaptive of hopping.

3.1 Adversary Strategy Awareness and Hopping Trigger Engine

According to the behavior characteristics of different network scanning strategies, SEHT adopts Sibson entropy [24] to obtain the distribution of failed requested packets so as to discriminate scanning strategy. Only failed request packets are chosen because successful requests contain both normal packets of legitimate users and the successful probe packets of attackers, but there is only one valid hEI for each end-point in every hopping period.

It has high accuracy and good stability in different anomalous awareness application scenarios [25].

Suppose the total number of failed request packets in the \(t^{th}\) mutation period is \(N_{fail}\). The number of failed request packets in the \(i^{th}\) divided hEI space is denoted as \(N_{fail}^i\). Equation (1) is used to calculate the probability distribution of the source and the destination address of failed requests in one mutation period denoted as \(P_i^{Src} (\pi )\) and \(P_i^{Dst} (\pi )\) respectively, with \(j\in \{Src,Dst\}\), \(\pi \in {\{hEI}\}\). Based on it, follow-up scanning strategy is discriminated after analyzing source address probability distribution of probe packets in adjacent \(T_{LTHR}\). Besides, blind scanning strategy is then discriminated after analyzing destination address probability distribution of probe packets in each \(T_{EHP}\).

Equation (2) indicates the Sibson entropy of the source address probability distribution of the failed request packets in the two consecutive \(T_{LTHR}\) of the \(i^{th}\) end-point, in which \(D_i (p,q)=\sum \limits _{\pi \in \varPi _i} {p(\pi )\cdot \log \frac{p(\pi )}{q(\pi )}}\), and \(\overline{P^{Src}}=\frac{1}{2}[P_{t-1}^{Src} (\pi )+P_t^{Src} (\pi )]\). In order to prevent the interference of network jitter, Sibson entropy is calculated in two consecutive \(T_{LTHR}\) instead of it in two consecutive \(T_{EHP}\) of the \(i^{th}\) end-point. Based on Eq. (2), whether the scanning is follow-up strategy or not can be discriminated by comparing the Sibson entropy with the setting threshold.

Chauvenet criterion, shown as Eq. (3), is used to eliminate the abnormal high-frequency temporal mutation space. If blind scanning strategy is used, attackers are to scan the entire end-point space. The average number of scanned times of every end-point is \(N_{fail}/m_B m_L\) in the ideal condition. However, because attackers might not always complete the scan of the whole end-point space within one \(T_{EHP}\), the Sibson entropy directly calculated based on the distribution of failed probe packets of destination address and that of \(N_{fail} /m_B m_L\) in one \(T_{EHP}\) will be larger. Therefore, the destination address probability distribution of the failed probe packets in the \(t^{th}\; T_{EHP}\) and its modified Sibson entropy are calculated by using Eq. (4), where \(D(p,q)=\sum \limits _{\pi \in \varPi } {p(\pi )\cdot \log \frac{p(\pi )}{q(\pi )}}\), and \(\overline{P_t^{Dst}} = \frac{1}{2}(P_t^{Dst}(\pi )+\frac{n_{fail}}{{m}'_B {m}'_L})\). By comparing with the setting threshold, whether blind scanning strategy is adopted or not can be determined. If not adopted, attackers will use half-blind reconnaissance strategy.

$$\begin{aligned} P_i^j (\pi )=\pi _k \cdot (\sum \limits _{k=1}^{N_{fail}} {\pi _k})^{-1} \end{aligned}$$
(1)
$$\begin{aligned} D_S (P_{t-1}^{Src} (\pi ),P_t^{Src} (\pi ))=\frac{1}{2}\{D_i[P_{t-1}^{Src} (\pi ),\overline{P^{Src}}]+D_i [P_t^{Src} (\pi ),\overline{P^{Src}}]\} \end{aligned}$$
(2)
$$\begin{aligned} \frac{N_{fail}^i - N_{fail} /m_B m_L}{(m_B m_L)^2/12}< -\xi \end{aligned}$$
(3)
$$\begin{aligned} D_S (P_t^{Dst} (\pi ),\frac{N_{fail}}{{m}'_B {m}'_L})=\frac{1}{2}\{D[P_t^{Dst} (\pi ),\overline{P_t^{Dst}}]+D[\frac{N_{fail}}{{m}'_B {m}'_L},\overline{P_t^{Dst}}]\} \end{aligned}$$
(4)

In order to improve the unpredictability of end-point mutation, SEHT select different hopping strategy according to the discrimination of scanning attack strategy. Consequently, hEI space is generated. The scanning attack strategies can be calculated as following. If there is \(\sqrt{D_S (P_{t-1}^{Src} (\pi ),P_t^{Src} (\pi ))} \le \delta _1\), follow-up scanning strategy is implemented by attackers. And when \(\sqrt{D_S (P_t^{Dst} (\pi ),\frac{N_{fail}}{{M}'})}\le \delta _2\), blind scanning strategy is implemented by attackers. Otherwise, when \(\sqrt{D_S (P_t^{Dst} (\pi ),\frac{N_{fail}}{{M}'})} >\delta _2\) and \(\sqrt{D_S (P_{t-1}^{Src} (\pi ),P_t^{Src} (\pi ))} >\delta _1\) establishes, half-blind scanning strategy is implemented by attackers.

Furthermore, if attackers use mixed scanning strategies, based on the self-learning of scanning strategies, SEHT implements corresponding hopping strategy according to the priority of follow-up scanning, half-blind scanning and blind scanning for efficient defense.

3.2 End-Point Hopping Based on SMT

In order to achieve the manageability and low overhead in the process of hopping implementation, SMT solver is used to obtain the required hEI set, which meets the security and performance constraints in end-point hopping.

Define Boolean variable \(b_T^v (k)\) indicates whether hopping switch v forwards the \(k^{th}\) net-flow in \(T_{EHP}\) or not. If hopping switch v forwards the \(k^{th}\) net-flow in \(T_{EHP} \), there is \(b_T^v (k)=1\). Otherwise, there is \(b_T^v (k)=0\). The details of SEHT constraints are shown as follows

  1. (1)

    Capacity constraint: This constraint is used to select hopping routers that can carry the maximum net-flow table size so as to prevent packet loss caused by data overflow [26].

    Equation (5) indicates the exponential function of marginal cost, where \(\sigma = 2n\) is a tuning parameter [27]. \(1-\textstyle {{C_v (k)} \over {C_v}}\) indicates the utilization ratio of the forwarding table of v when the forwarding table of the \(k^{th}\) net-flow is added. Equation (6) indicates the accumulated cost of added net-flow table should under the maximum net-flow table size \(C_{max}^v\) that hopping routers can carry.

    Equation (7) reduces route overhead by using route aggregation and adjacent allocation principles in routing update, which prevents the explosion of flow table size. \(D_{j_1 ,j_2}^k = B_{j_1}^k \wedge B_{j_2}^k \wedge C_{j_1 ,j_2}\) means the assigned end-point information \(j_1\) and \(j_2\) in consecutive \(T_{EHP}\) to the same subnet are continuous, in which \(B_j^k = \mathop \vee \limits _{h^i\in s^k} b_j^i\) represents there is at least one end-point node \(h^i\) in subnet \(s_k\) assigned to hopping space j. Besides, \(\varPhi \) is the lower bound of the number of end-point information in each hopping space.

    $$\begin{aligned} c_v (k)=C_v (\sigma ^{1-\textstyle {{C_v (k)} \over {C_v}}}-1) \end{aligned}$$
    (5)
    $$\begin{aligned} \forall hR_i, \quad C_{max}^v -\sum \limits _{i=1}^k {b_T^v (i)\cdot c_v (i)} \ge C_{th}^v, \quad b_T^v (i)=1 \end{aligned}$$
    (6)
    $$\begin{aligned} \sum \limits _k {\sum \limits _{j_1} {\sum \limits _{j_1 \ne j_2} {B_{j_1}^k\wedge B_{j_2}^k \wedge C_{j_1, j_2}}}} \ge \varPhi \end{aligned}$$
    (7)
  2. (2)

    Hopping space selection constraint: This constraint ensures the unpredictability of SEHT by limiting repetition rate in hEI selection. Equation (8) ensures that every end-point node can be assigned hEI. Equation (9) sets repetition rate threshold \(\delta _3\) so as to ensure the repetition of selected hEI not exceed the threshold. Furthermore, Eq. (10) requires that the assigned hEI in the last hopping period won’t be assigned in the following hopping period. This constraint ensures every node can be assigned required hEI, and improves the unpredictability of hopping.

    $$\begin{aligned} \sum \limits _{1<j\le M} {b_i^j} \ge 1 \end{aligned}$$
    (8)
    $$\begin{aligned} \sum {b_i^j} \ge \frac{N_{LTHR}^i -1}{2\delta _3 n_{HTHR}} \end{aligned}$$
    (9)
    $$\begin{aligned} \forall hEI\in F b_i^j = 0 \end{aligned}$$
    (10)
  3. (3)

    Reachability constraint: This constraint means all net-flows in forwarding routers are reachable to destination end-point nodes. Equation (11) represents that the in-degree and out-degree of each router in the forwarding path is equal. Equation (12) means each router in the forwarding path is physically adjacent to its last hopping router and next hopping router, in which \(\chi (hR_i)\) is routing set eliminating source and destination routers in the forwarding path. However, forwarding net-flows from one router to its next physical adjacent router is not enough to guarantee the reachability of net-flow. Equation (13) requires the distance from the next hopping router to destination router is not larger than the distance from the current hopping router to destination router, in which \(d_k^{i-Dst}\) represents the distance from router i to destination router.

    $$\begin{aligned} \textit{If} \quad b_T^k =1, k\in [1,n], \quad \sum \limits _{i\in I} {b_T^v (i)}=\sum \limits _{o\in O} {b_T^v} (o) \end{aligned}$$
    (11)
    $$\begin{aligned} \textit{If} \quad b_i^k =1, \forall hR_j \in \chi (hR_i), \quad \sum {b_j^k} =2 \end{aligned}$$
    (12)
    $$\begin{aligned} \textit{If} \quad \forall hR_j \in \{\textit{hR}\vert \textit{next-hop of hR}_i\}, \quad d_k^{j-Dst} \le d_k^{i-Dst} \end{aligned}$$
    (13)
  4. (4)

    Forwarding path delay constraint: This constraint prevents service performance decrease due to the excessive transmission delay. Since net-flow transmission delay is positively correlated with the number of routing nodes [28], Eq. (14) indicates that the maximum length of forwarding path cannot exceed the threshold \(L_{\max }\).

    $$\begin{aligned} \sum {b_i^k} \le L_{\max } \quad i\in \{Src,hR_1 ,...,Dst\} \end{aligned}$$
    (14)

4 Implementation of SEHT Based on SDN

As is shown in Fig. 2, SEHT uses hopping switch (HS), randomization controller (RC) and the trusted hopping components (THC) of end-point nodes to implement network hopping collaboratively. RC divides \({\{hEI}\}\) to BHR according to the number of subnet and its scale. HS divides BHR to LTHR according to the number of end-points and their importance. THC selects hEI according to hopping strategy by using shared parameters with HS.

Fig. 2.
figure 2

SEHT Structure based on SDN.

RC mainly consists with hopping trigger, hopping decision engine, and SMT solver of hopping space module. The function of hopping trigger module is to analyze scanning strategy based on hypothesis tests, according to the illegal connection packets reported by HS. Hopping decision engine is to select different hopping strategies according to scanning strategies. While SMT solver is to obtain the required end-point information set according to hopping constraints and global view of SDN. After that, RC updates LTHR to HS.

THC of end-point nodes is used to negotiate mutation with THC in other end-points, and implementing virtual mapping from EI to hEI. THC in SEHT is based on a universal virtual-network kernel driver TAP. In order to be transparent to users’ applications, network hopping needs to operate Ethernet frames using TAP under Linux.

In order to ensure the hopping efficiency of SEHT and the stability of network sessions, end-points will store two hEI the first time. One is considered as the active hopping end-point information. The other will be utilized at the next hopping period, which is pre-calculated so as to notice other communicating THCs to be prepared to hopping when \(T_{EHP}\) is expired. At the same times, since there are still ongoing sessions in the network during end-point hopping, Change Time To Live (CTTL) is set so that expired hEI is retained to receive packets of existing sessions.

Since the flow tables need to update because of end-point and routing mutation during network communications, it is necessary to prevent the inconsistency of flow table update and packet loss. Directed to this problem, SEHT adopts delete in sequential order, and add in reverse update policy.

5 Experiments and Analysis

In order to verify the feasibility and effectiveness of SEHT, we use Mininet to build simulation network topology and adopt Erdos-Renyi model for random network topology generation. We choose OpenVSwitch (OVS) supporting Openflow protocol as HS, and OpenDaylight as RC. SEHT is deployed on OpenDaylight and OVS. Besides, Z3 SMT solver is used to solve the constraints. Linux CentOS 6.5 is used in Web Server and FTP Server. Windows7 is used in client. Besides, hEI is composed of Class B IP address pool and \(2^{16}\) size port pool. The configuration of SEHT is shown in Table 2.

Table 2. Initial parameters of SEHT configuration

5.1 Self-adaptive Hopping Overhead

The overhead of static networks, ST-RHM and SEHT hopping is shown in Table 3. It mainly consists of mutation computational complexity, average transmission delay and flow table size.

Assuming the number of host nodes in a subnet is \(n_t\), hEI space is \(n_m\), and EI can be aggregated is \(n_a\). The size of net-flow table size in static network is \(n_t\). Because in each hopping period, hEI is selected from all available hEI set, the size of net-flow table is \(1+n_m m_H\). While with capacity constraints, the size of net-flow table is \(1+m_H n_m /n_a\). Compared with ST-RHM, SEHT can effectively reduce the size of net-flow table.

Table 3. End-point hopping overhead

5.2 Defend Scanning Attacks Analysis

Suppose there are \(n_l\) active end-point nodes in the network, the end-point information space is m, scanning width of attacker is \(1/T_{SCN}\), and the scanning frequency is \(n_s=w\cdot t/T_{SCN}\). The number of the end-point information scanned by the attack is \(n_s=w\cdot t/T_{SCN}\), \(n_s \le m\). The ratio of scanning frequency to mutation frequency is \(r=T_{EHP}/T_{SCN}\).

(1) The Capability of Resist Blind Scanning Attack. Since the blind scanning strategy is used to enhance the scanning rate. The success rate of scanning x active end-point nodes by attackers in static network, which can be supposed as \(T_{EMP} =\infty \), obeys hypergeometric distribution expressed as \(P_b (x)=(C_{n_l}^x \cdot C_{m-n_l}^{n_s -x})/C_m^{n_s}\).

Hence, the success rate of attackers in static network is . In OF-RHM [16], ST-RHM [17], and SEHT network, the probability of successfully scanning x active nodes during one mutation period obeys Bernoulli distribution. The success rate of attackers using blind scanning strategy is . Particularly when \(r=1\), the scanning attack frequency is the same as the hopping frequency, the probability that an attacker successfully launching blind scanning is \(P_b^{static} (x>0) = 1-C_{m-n_l}^{n_s} /C_m^{n_s}\). Compared with static network, it can be concluded that OF-RHM, ST-RHM, and SEHT can effectively resist blind scanning strategy, which is consistent with the conclusion in [29].

(2) The Capability of Resist Follow-Up Scanning Attack. When attackers use follow-up scanning strategy, there will be \(r\ge 1\) in active scanning. Suppose attackers can repeat scanning b times in one \(T_{EMP} \). The success rate of attackers in OF-RHM is , which is consistent with the analysis in [11]. The success rate of attacker in ST-RHM is . Since SEHT deploys hopping period stretch policy, the hopping rate will lead to \(r\le 1\) after the follow-up scanning strategy is learnt by SEHT. As a result, the success rate of attackers in SEHT is . Analysis shows that compared with ST-RHM, SEHT can effectively defend the follow-up scanning by combining spatial hopping with hopping period stretch policy.

Fig. 3.
figure 3

SEHT Assessments to defend scanning attacks.

(3) The Capability of Resist Half-Blind Scanning Attack. Since half-blind scanning strategy is used to actively scan specific range of end-point information which is physically adjacent to scanning source, it can be assumed that attacker can repeat scanning a times, and the scanning range is \(\varphi m\), \(\varphi \in (0,1)\), where there are \({n}'_l\) active end-point nodes. Since OF-RHM adopts random hopping, the success rate of attackers using half-blind scanning strategy in OF-RHM is . As for ST-RHM, it uses deceiving hopping. It can be assumed that there are \(n_\gamma \) hEI invalid at the end of each hopping period. The success rate of attackers using half-blind scanning strategy in ST-RHM is . Since SEHT deploys random mutation based on weighted value, \(\sigma \) hEI will be selected for the next hopping period in each \(T_{EHP}\). The success rate of half-blind hopping strategy in SEHT is .

(4) The Capability to Resist Mixed Scanning Attack. In practical environments, the attacker often filtered EI through blind scanning. On this basis, half-blind or follow-up scanning is used in specific EI range. The success rate of mixed scanning attack is shown in Fig. 3(d). Since in static network, the success rate of attacker increases dramatically when the strategy changes from blind scanning attack to half-blind scanning attack. Since SEHT introduces hopping period stretch policy after discriminate follow-up scanning, it can effectively reduce about 29% scanning attack compared with ST-RHM and can reduce about 75% scanning attack compared with OF-RHM.

6 Conclusion

Without the awareness of attack strategies, existing end-point hopping mechanisms have two major problems. First, the hopping mechanism selection is blindness. Second, high hopping overhead leads the defense system to bad availability. To address these challenges, a novel MTD approach named Self-adaptive End-point Hopping Technique (SEHT) is proposed, which is based on adversary strategy awareness and implemented by Software Defined Networking (SDN). The advantages of this mechanism are represented by two aspects. Hopping trigger based on adversary strategy awareness is proposed for guiding the choice of hopping mode by discriminating the scanning attack strategy. And to ensure the low-overhead of hopping, satisfiability modulo theories and are used to formally describe the constraints of hopping. Theoretical analysis and simulation experiments show that SEHT can resist almost 90% scanning attack even in mixed scanning strategy with low-overhead hopping.