Abstract
Moving Target Defense has been proposed as a way to alter the asymmetric situation of attacks and defenses, and there has been given a great number of related works. Currently, the performance evaluation of these works has largely been empirical, but lacks the application of theoretical models. Further, the evaluation is usually for a specific approach or a category of MTD approaches, and few work has been taken to compare different MTD techniques. In this paper, we consider a Web server as a deployment scenario for the three typical kinds of MTD techniques, and develop a generalized abstract performance evaluation and comparison model for existing MTDs through using generalized stochastic Petri Net (GSPN). We also take a case study to describe the usage of the model. The model enables us to analyze and understand the benefits and costs of an MTD approach, and can be viewed as an attempt to fill the gap of MTD comparison.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Liu, Y., Peng, W., Jinshu, S.: A study of IP prefix hijacking in cloud computing networks. Secur. Commun. Netw. 7(11), 2201–2210 (2014)
Wang, T.-Z., Wang, H.-M., Liu, B., Ding, B., Zhang, J., Shi, P.-C.: Further analyzing the sybil attack in mitigating peer-to-peer botnets. KSII Trans. Internet Inf. Syst. 6(10), 2731–2749 (2012)
Wang, F., Wang, H., Wang, X., Jinshu, S.: A new multistage approach to detect subtle DDoS attacks. Math. Comput. Model. 55(1), 198–213 (2012)
Prism. https://en.wikipedia.org/wiki/PRISM_(surveillance_program). Accessed 18 Nov 2013
The heartbleed bug. http://heartbleed.com/. Accessed 1 Oct 2014
NITRD, CSIA, and IWG: Cybersecurity game-change research and development recommendations. http://www.nitrd.gov/pubs/CSIA_IWG_NITRD. Accessed 20 Aug 2013
CSIA: Trustworthy cyberspace: strategic plan for the federal cybersecurity research and development program. The United States Government. http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf. Accessed 10 Dec 2012
Chong, F., Lee, R.B., Acquisti, A., Horne, W., Palmer, C., Ghosh, A.K., Pendarakis, D.: National cyber leap year summit 2009 co-chairs report. NITRD. https://www.nitrd.gov/nitrdgroups/index.php?title=Category:National_Cyber_Leap_Year_Summit_2009. Accessed 1 Jan 2014
Carroll, T.E., Crouse, M., Fulp, E.W., Berenhaut, K.S.: Analysis of network address shuffling as a moving target defense. In 2014 IEEE International Conference on Communications (ICC), pp. 701–706, June 2014
Luo, Y.B., Wang, B.S., Cai, G.L.: Effectiveness of port hopping as a moving target defense. In: 2014 7th International Conference on Security Technology (SecTech), pp. 7–10, December 2014
Crouse, M., Prosser, B., Fulp, E.W.: Probabilistic performance analysis of moving target and deception reconnaissance defenses. In: Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, pp. 21–29. ACM, New York (2015)
Xu, J., Guo, P., Zhao, M., Erbacher, R.F., Zhu, M., Liu, P.: Comparing different moving target defense techniques. In: Proceedings of the First ACM Workshop on Moving Target Defense, pp. 97–107. ACM (2014)
Lin, C.: Performance Evaluation of Computer Networks and Computer Systems (in Chinese), 1st edn. Tsinghua University Press, Beijing (2001)
Cai, G., Wang, B., Luo, Y., Li, S., Wang, X.: Characterizing the running patterns of moving target defense mechanisms. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 191–196, January 2016
Cai, G., Wang, B., Wang, X., Yuan, Y., Li, S.: An introduction to network address shuffling. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 1–2, January 2016
Dunlop, M., Groat, S., Urbanski, W., Marchany, R., Tront, J.: The blind man’s bluff approach to security using IPv6. IEEE Secur. Priv. 10(4), 35–43 (2012)
Al-Shaer, E., Duan, Q., Jafarian, J.H.: Random host mutation for moving target defense. In: Pietro, R., Keromytis, A.D. (eds.) SecureComm 2012. LNICST, vol. 106, pp. 310–327. Springer, Heidelberg (2013)
Jafarian, J.H.H., Al-Shaer, E., Duan, Q.: Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers. In: Proceedings of the First ACM Workshop on Moving Target Defense, pp. 69–78. ACM (2014)
Azab, M., Hassan, R., Eltoweissy, M.: Chameleonsoft.: a moving target defense system. In: 2011 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 241–250, October 2011
Okhravi, H., Comella, A., Robinson, E., Haines, J.: Creating a cyber moving target for critical infrastructure applications using platform diversity. Int. J. Crit. Infrastruct. Prot. 5(1), 30–39 (2012)
Huang, Y., Ghosh, A.K.: Introducing diversity and uncertainty to create moving attack surfaces for web services. In: Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Moving Target Defense. Advances in Information Security, vol. 54, pp. 131–151. Springer, New York (2011)
Bonet, P., Lladó, C.M., Puijaner, R., Knottenbelt, W.J.: Pipe v2.5.: a petri net tool for performance modelling. In: Proceedings of the 23rd Latin American Conference on Informatics (CLEI) (2007)
Dingle, N.J., Knottenbelt, W.J., Suto, T.: Pipe2: a tool for the performance evaluation of generalised stochastic petri nets. ACM SIGMETRICS Perform. Eval. Rev. 36(4), 34–39 (2009)
Trivedi, K.S.: Probability and Statistics with Reliability, Queuing and Computer Science Applications, 2nd edn. Wiley, Chichester (2002)
Shi, L., Jia, C., Lv, S.: Performance evaluation of service hopping system using stochastic petri net. Acta Scientiarum Naturalium Universitatis Nankaiensis 42(1), 72–75 (2009). (in Chinese)
Moody, W., Hongxin, H., Apon, A.: Defensive maneuver cyber platform modeling with stochastic petrinets. In: International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 531–538. IEEE (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer Science+Business Media Singapore
About this paper
Cite this paper
Cai, G., Wang, B., Luo, Y., Hu, W. (2016). A Model for Evaluating and Comparing Moving Target Defense Techniques Based on Generalized Stochastic Petri Net. In: Wu, J., Li, L. (eds) Advanced Computer Architecture. ACA 2016. Communications in Computer and Information Science, vol 626. Springer, Singapore. https://doi.org/10.1007/978-981-10-2209-8_16
Download citation
DOI: https://doi.org/10.1007/978-981-10-2209-8_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-2208-1
Online ISBN: 978-981-10-2209-8
eBook Packages: Computer ScienceComputer Science (R0)