Skip to main content

A Model for Evaluating and Comparing Moving Target Defense Techniques Based on Generalized Stochastic Petri Net

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 626))

Abstract

Moving Target Defense has been proposed as a way to alter the asymmetric situation of attacks and defenses, and there has been given a great number of related works. Currently, the performance evaluation of these works has largely been empirical, but lacks the application of theoretical models. Further, the evaluation is usually for a specific approach or a category of MTD approaches, and few work has been taken to compare different MTD techniques. In this paper, we consider a Web server as a deployment scenario for the three typical kinds of MTD techniques, and develop a generalized abstract performance evaluation and comparison model for existing MTDs through using generalized stochastic Petri Net (GSPN). We also take a case study to describe the usage of the model. The model enables us to analyze and understand the benefits and costs of an MTD approach, and can be viewed as an attempt to fill the gap of MTD comparison.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Liu, Y., Peng, W., Jinshu, S.: A study of IP prefix hijacking in cloud computing networks. Secur. Commun. Netw. 7(11), 2201–2210 (2014)

    Article  Google Scholar 

  2. Wang, T.-Z., Wang, H.-M., Liu, B., Ding, B., Zhang, J., Shi, P.-C.: Further analyzing the sybil attack in mitigating peer-to-peer botnets. KSII Trans. Internet Inf. Syst. 6(10), 2731–2749 (2012)

    Google Scholar 

  3. Wang, F., Wang, H., Wang, X., Jinshu, S.: A new multistage approach to detect subtle DDoS attacks. Math. Comput. Model. 55(1), 198–213 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  4. Prism. https://en.wikipedia.org/wiki/PRISM_(surveillance_program). Accessed 18 Nov 2013

  5. The heartbleed bug. http://heartbleed.com/. Accessed 1 Oct 2014

  6. NITRD, CSIA, and IWG: Cybersecurity game-change research and development recommendations. http://www.nitrd.gov/pubs/CSIA_IWG_NITRD. Accessed 20 Aug 2013

  7. CSIA: Trustworthy cyberspace: strategic plan for the federal cybersecurity research and development program. The United States Government. http://www.whitehouse.gov/sites/default/files/microsites/ostp/fed_cybersecurity_rd_strategic_plan_2011.pdf. Accessed 10 Dec 2012

  8. Chong, F., Lee, R.B., Acquisti, A., Horne, W., Palmer, C., Ghosh, A.K., Pendarakis, D.: National cyber leap year summit 2009 co-chairs report. NITRD. https://www.nitrd.gov/nitrdgroups/index.php?title=Category:National_Cyber_Leap_Year_Summit_2009. Accessed 1 Jan 2014

  9. Carroll, T.E., Crouse, M., Fulp, E.W., Berenhaut, K.S.: Analysis of network address shuffling as a moving target defense. In 2014 IEEE International Conference on Communications (ICC), pp. 701–706, June 2014

    Google Scholar 

  10. Luo, Y.B., Wang, B.S., Cai, G.L.: Effectiveness of port hopping as a moving target defense. In: 2014 7th International Conference on Security Technology (SecTech), pp. 7–10, December 2014

    Google Scholar 

  11. Crouse, M., Prosser, B., Fulp, E.W.: Probabilistic performance analysis of moving target and deception reconnaissance defenses. In: Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, pp. 21–29. ACM, New York (2015)

    Google Scholar 

  12. Xu, J., Guo, P., Zhao, M., Erbacher, R.F., Zhu, M., Liu, P.: Comparing different moving target defense techniques. In: Proceedings of the First ACM Workshop on Moving Target Defense, pp. 97–107. ACM (2014)

    Google Scholar 

  13. Lin, C.: Performance Evaluation of Computer Networks and Computer Systems (in Chinese), 1st edn. Tsinghua University Press, Beijing (2001)

    Google Scholar 

  14. Cai, G., Wang, B., Luo, Y., Li, S., Wang, X.: Characterizing the running patterns of moving target defense mechanisms. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 191–196, January 2016

    Google Scholar 

  15. Cai, G., Wang, B., Wang, X., Yuan, Y., Li, S.: An introduction to network address shuffling. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), pp. 1–2, January 2016

    Google Scholar 

  16. Dunlop, M., Groat, S., Urbanski, W., Marchany, R., Tront, J.: The blind man’s bluff approach to security using IPv6. IEEE Secur. Priv. 10(4), 35–43 (2012)

    Article  Google Scholar 

  17. Al-Shaer, E., Duan, Q., Jafarian, J.H.: Random host mutation for moving target defense. In: Pietro, R., Keromytis, A.D. (eds.) SecureComm 2012. LNICST, vol. 106, pp. 310–327. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  18. Jafarian, J.H.H., Al-Shaer, E., Duan, Q.: Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers. In: Proceedings of the First ACM Workshop on Moving Target Defense, pp. 69–78. ACM (2014)

    Google Scholar 

  19. Azab, M., Hassan, R., Eltoweissy, M.: Chameleonsoft.: a moving target defense system. In: 2011 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 241–250, October 2011

    Google Scholar 

  20. Okhravi, H., Comella, A., Robinson, E., Haines, J.: Creating a cyber moving target for critical infrastructure applications using platform diversity. Int. J. Crit. Infrastruct. Prot. 5(1), 30–39 (2012)

    Article  Google Scholar 

  21. Huang, Y., Ghosh, A.K.: Introducing diversity and uncertainty to create moving attack surfaces for web services. In: Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.) Moving Target Defense. Advances in Information Security, vol. 54, pp. 131–151. Springer, New York (2011)

    Chapter  Google Scholar 

  22. Bonet, P., Lladó, C.M., Puijaner, R., Knottenbelt, W.J.: Pipe v2.5.: a petri net tool for performance modelling. In: Proceedings of the 23rd Latin American Conference on Informatics (CLEI) (2007)

    Google Scholar 

  23. Dingle, N.J., Knottenbelt, W.J., Suto, T.: Pipe2: a tool for the performance evaluation of generalised stochastic petri nets. ACM SIGMETRICS Perform. Eval. Rev. 36(4), 34–39 (2009)

    Article  Google Scholar 

  24. Trivedi, K.S.: Probability and Statistics with Reliability, Queuing and Computer Science Applications, 2nd edn. Wiley, Chichester (2002)

    MATH  Google Scholar 

  25. Shi, L., Jia, C., Lv, S.: Performance evaluation of service hopping system using stochastic petri net. Acta Scientiarum Naturalium Universitatis Nankaiensis 42(1), 72–75 (2009). (in Chinese)

    Google Scholar 

  26. Moody, W., Hongxin, H., Apon, A.: Defensive maneuver cyber platform modeling with stochastic petrinets. In: International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), pp. 531–538. IEEE (2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guilin Cai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer Science+Business Media Singapore

About this paper

Cite this paper

Cai, G., Wang, B., Luo, Y., Hu, W. (2016). A Model for Evaluating and Comparing Moving Target Defense Techniques Based on Generalized Stochastic Petri Net. In: Wu, J., Li, L. (eds) Advanced Computer Architecture. ACA 2016. Communications in Computer and Information Science, vol 626. Springer, Singapore. https://doi.org/10.1007/978-981-10-2209-8_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2209-8_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2208-1

  • Online ISBN: 978-981-10-2209-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics