skip to main content
10.1145/2995272.2995283acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
short-paper

Mayflies: A Moving Target Defense Framework for Distributed Systems

Published:24 October 2016Publication History

ABSTRACT

prevent attackers from gaining control of the system using well established techniques such as; perimeter-based fire walls, redundancy and replications, and encryption. However, given sufficient time and resources, all these methods can be defeated. Moving Target Defense (MTD), is a defensive strategy that aims to reduce the need to continuously fight against attacks by disrupting attackers gain-loss balance. We present Mayflies, a bio-inspired generic MTD framework for distributed systems on virtualized cloud platforms. The framework enables systems designed to defend against attacks for their entire runtime to systems that avoid attacks in time intervals. We discuss the design, algorithms and the implementation of the framework prototype. We illustrate the prototype with a quorum-based Byzantime Fault Tolerant system and report the preliminary results.

References

  1. LibVMI: Library For Virtual Introspection. http://libvmi.com, Accessed April 19, 2016.Google ScholarGoogle Scholar
  2. BFT-SMaRT: High-Performance Byzantine Fault-Tolerant State Machine Replication. http://bft-smart.github.io/library/, Accessed April 20, 2016.Google ScholarGoogle Scholar
  3. Openstack. http://www.openstack.org, Accessed April 20, 2016.Google ScholarGoogle Scholar
  4. I. Ahmed, A. Zoranic, S. Javaid, and G. G. Richard. ModChecker: Kernel Module Integrity Checking in The Cloud Environment. In 41st International Conference on Parallel Processing Workshops (ICPPW), pages 306--313. IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. N. Ahmed and B. Bhargava. Towards targeted intrusion detection deployments in cloud computing. International Journal of Next-Generation Computing, 6(2), 2015.Google ScholarGoogle Scholar
  6. A. Bessani, J. Sousa, and E. E. Alchieri. State Machine Replication for The Masses with BFT-SMaRT. In 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pages 355--362. IEEE, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. D. Bowers, M. Van Dijk, R. Griffin, A. Juels, A. Oprea, R. L. Rivest, and N. Triandopoulos. Defending Against The Unknown Enemy: Applying FlipIt to System Security. In Decision and Game Theory for Security, pages 248--263. Springer, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  8. M. M. Carvalho, T. C. Eskridge, L. Bunch, J. M. Bradshaw, A. Dalton, P. Feltovich, J. Lott, and D. Kidwell. A Human-agent Teamwork Command and Control Framework for Moving Target Defense (MTC2). In Proceedings of The 8th Annual Cyber Security and Information Intelligence Research Workshop, page 38. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Chen and A. Avizienis. N-version Programming: A Fault-Tolerance Approach to Reliability of Software Operation. In Digest of Papers FTCS-8: 8th Annual International Conference on Fault Tolerant Computing, pages 3--9, 1978.Google ScholarGoogle Scholar
  10. Y. Chen, Z. Wang, D. Whalley, and L. Lu. Remix: On-demand Live Randomization. In The Proceedings of The 6th ACM on Conference on Data and Application Security and Privacy, pages 50--61. ACM, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. N-variant Systems: A Secretless Framework for Security Through Diversity. In Usenix Security, volume 6, pages 105--120, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Forrest, A. Somayaji, and D. H. Ackley. Building Diverse Computer Systems. In The 6th Workshop on Hot Topics in Operating Systems, pages 67--72. IEEE, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. T. Gar nkel, M. Rosenblum, et al. A Virtual Machine Introspection Based Architecture for Intrusion Detection. In The Proceedings of The Network and Distributed System Security (NDSS), volume 3, pages 191--206, 2003.Google ScholarGoogle Scholar
  14. C. Giu rida, A. Kuijsten, and A. S. Tanenbaum. Enhanced Operating System Security Through Efficient and Fine-Grained Address Space Randomization. In Presented as part of The 21st USENIX Security Symposium (USENIX Security 12), pages 475--490, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Hong, L. Xu, H. Wang, and G. Gu. Poisoning Network Visibility in Software-De ned Networks: New Attacks and Countermeasures. In Network and Distributed System Security (NDSS), 2015.Google ScholarGoogle Scholar
  16. J. H. Jafarian, E. Al-Shaer, and Q. Duan. Open ow Random Host Mutation: Transparent Moving Target Defense Using Software De ned Networking. In The Proceedings of The 1st Workshop on Hot Topics in Software De ned Networks, pages 127--132. ACM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, volume 54. Springer Science & Business Media, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. P. K. Manadhata and J. M. Wing. An attack surface metric. Software Engineering, IEEE Transactions on, 37(3):371--386, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. H. Okhravi, E. I. Robinson, S. Yannalfo, P. W. Michaleas, J. Haines, and A. Comella. TALENT: Dynamic Platform Heterogeneity for Cyber Survivability of Mission Critical Applications. In Secure and Resilient Cyber Architecture Conference (SRCA'10), 2010.Google ScholarGoogle Scholar
  20. Openstack.org. OpenStack cloud management framework, 2014.Google ScholarGoogle Scholar
  21. G. Portokalidis and A. D. Keromytis. Fast and Practical Instruction-set Randomization for Commodity Systems. In The Proceedings of The 26th Annual Computer Security Applications Conference, pages 41--48. ACM, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Rauti, S. Lauräen, S. Hosseinzadeh, J.-M. Makela, S. Hyrynsalmi, and V. Leppanen. Diversification of System Calls in Linux Binaries. In Trusted Systems, pages 15--35. Springer, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. B. Sweeney. Mayflies and Stoneflies: Life Histories and Biology. Kluwer Academic Publisher, 1987.Google ScholarGoogle Scholar
  24. B. Sweeney and R. Vannote. Population Synchrony in Mayflies: A Predator Satiation Hypothesis. Evolution, 36:810--821, 1982.Google ScholarGoogle Scholar

Index Terms

  1. Mayflies: A Moving Target Defense Framework for Distributed Systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MTD '16: Proceedings of the 2016 ACM Workshop on Moving Target Defense
      October 2016
      144 pages
      ISBN:9781450345705
      DOI:10.1145/2995272
      • Program Chairs:
      • Peng Liu,
      • Cliff Wang

      Copyright © 2016 ACM

      © 2016 Association for Computing Machinery. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the United States Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 October 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      MTD '16 Paper Acceptance Rate9of26submissions,35%Overall Acceptance Rate40of92submissions,43%

      Upcoming Conference

      ICSE 2025

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader