skip to main content
10.1145/2808475.2808486acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
short-paper

VINE: A Cyber Emulation Environment for MTD Experimentation

Published: 12 October 2015 Publication History

Abstract

Dynamic and moving target defenses are generally characterized by their ability to modify their own state, or the state of the protected target. As such, the evolution of these kinds of defenses require specialized experiments that can capture their behavior and effectiveness through time, as well as their broader impacts in the network. While specialized experiments can be constructed to evaluate specific defenses, there is a need for a general approach that will facilitate such tasks. In this work we introduce VINE, a high-fidelity cyber experimentation environment designed for the study and evaluation of dynamic and moving target defenses. VINE provides a common infrastructure supporting the construction, deployment, execution, and monitoring of complex mission-driven network scenarios that are fully instrumented. The tool was designed to be scalable, extensible, and highly configurable to enable the study of cyber defense strategies under dynamic background traffic and attack conditions, making VINE well-suited for the study of adaptive and moving target defenses. In this paper we introduce the VINE approach, the VINE architecture for MTD experimentation, and provide an illustrative example of the framework in action.

References

[1]
M. Carvalho, T. C. Eskridge, L. Bunch, A. Dalton, R. Hoffman, J. M. Bradshaw, P. J. Feltovich, D. Kidwell, and T. Shanklin. Mtc2: A command and control framework for moving target defense and cyber resilience. In Resilient Control Systems (ISRCS), 2013 6th International Symposium on, pages 175--180, 2013.
[2]
M. Carvalho and M. Marcon. Genesis. Technical Report HIAI-TR-15--3--1, Florida Institute of Technology, 2015.
[3]
M. M. Carvalho, J. M. Bradshaw, L. Bunch, T. C. Eskridge, P. J. Feltovich, R. R. Hoffman, and D. Kidwell. Command and control requirements for moving-target defense. IEEE Intelligent Systems, 27(3):79--85, 2012.
[4]
J. Mirkovic, T. V. Benzel, T. Faber, R. Braden, J. T. Wroclawski, M. D. Rey, and S. Schwab. The DETER Project: Advancing the science of cyber security experimentation and test. pages 1--7, 2010.
[5]
Naval Research Lab. Extendable mobile ad-hoc network emulator (EMANE), 2015.
[6]
P. Ogren. Increasing Modularity of UAV Control Systems using Computer Game Behavior Trees. American Institute of Aeronautics and Astronautics, 2015/06/15 2012.
[7]
Rapid7. Penetration testing software | metasploit, 2015.
[8]
E. L. Stoner. A foundation for cyber experimentation. Master's thesis, Computer Science, 2015.
[9]
The OpenStack Foundation. OpenStack open source cloud computing software, 2015.

Cited By

View all
  • (2023)Effective Defense Strategies in Network Security using improved Double Dueling Deep Q-networkComputers & Security10.1016/j.cose.2023.103578(103578)Online publication date: Nov-2023
  • (2022)Dynamic defenses in cyber security: Techniques, methods and challengesDigital Communications and Networks10.1016/j.dcan.2021.07.0068:4(422-435)Online publication date: Aug-2022
  • (2021)Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance EvaluationWireless Communications and Mobile Computing10.1155/2021/24278962021(1-12)Online publication date: 24-Aug-2021
  • Show More Cited By

Index Terms

  1. VINE: A Cyber Emulation Environment for MTD Experimentation

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MTD '15: Proceedings of the Second ACM Workshop on Moving Target Defense
      October 2015
      114 pages
      ISBN:9781450338233
      DOI:10.1145/2808475
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 October 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. moving target defense experimentation
      2. network creation
      3. network emulation
      4. network monitoring

      Qualifiers

      • Short-paper

      Conference

      CCS'15
      Sponsor:

      Acceptance Rates

      MTD '15 Paper Acceptance Rate 8 of 19 submissions, 42%;
      Overall Acceptance Rate 40 of 92 submissions, 43%

      Upcoming Conference

      ICSE 2025

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)22
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 28 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Effective Defense Strategies in Network Security using improved Double Dueling Deep Q-networkComputers & Security10.1016/j.cose.2023.103578(103578)Online publication date: Nov-2023
      • (2022)Dynamic defenses in cyber security: Techniques, methods and challengesDigital Communications and Networks10.1016/j.dcan.2021.07.0068:4(422-435)Online publication date: Aug-2022
      • (2021)Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance EvaluationWireless Communications and Mobile Computing10.1155/2021/24278962021(1-12)Online publication date: 24-Aug-2021
      • (2021)A comprehensive evaluation of diversity systems based on mimic defenseScience China Information Sciences10.1007/s11432-020-3008-164:12Online publication date: 9-Nov-2021
      • (2020)Blockchain Performance Analysis for Supporting Cross-Border E-Government ServicesIEEE Transactions on Engineering Management10.1109/TEM.2020.297932567:4(1310-1322)Online publication date: Nov-2020
      • (2019)Building an emulation environment for cyber security analyses of complex networked systemsProceedings of the 20th International Conference on Distributed Computing and Networking10.1145/3288599.3288618(203-212)Online publication date: 4-Jan-2019
      • (2018)Extracting Knowledge from Open Source Projects to Improve Program SecuritySoutheastCon 201810.1109/SECON.2018.8478906(1-7)Online publication date: Apr-2018
      • (2018)Active Defense TechniquesCyber Resilience of Systems and Networks10.1007/978-3-319-77492-3_10(221-246)Online publication date: 30-May-2018
      • (2017)Adaptive Resource Management Enabling Deception (ARMED)Proceedings of the 12th International Conference on Availability, Reliability and Security10.1145/3098954.3103151(1-8)Online publication date: 29-Aug-2017
      • (2017)High fidelity adaptive cyber emulation2017 IEEE Symposium Series on Computational Intelligence (SSCI)10.1109/SSCI.2017.8285392(1-8)Online publication date: Nov-2017
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media