skip to main content
10.1145/3199478.3199487acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

A System Attack Surface Based MTD Effectiveness and Cost Quantification Framework

Authors Info & Claims
Published:16 March 2018Publication History

ABSTRACT

Moving Target Defense (MTD) is a game-changing method to thwart adversaries and reverses the imbalance situation in network countermeasures. Introducing Attack Surface (AS) into MTD security assessment brings productive concepts to qualitative and quantitative analysis. The quantification of MTD effectiveness and cost (E&C) has been under researched, using simulation models and emulation testbeds, to give accurate and reliable results for MTD technologies. However, the lack of system-view evaluation impedes MTD to move toward large-scale applications. In this paper, a System Attack Surface Based Quantification Framework (SASQF) is proposed to establish a system-view based framework for further research in Attack Surface and MTD E&C quantification. And a simulated model based on SASQF is developed to provide illustrations and software simulation methods. A typical C/S scenario and Cyber Kill Chain (CKC) attacks are presented in case study and several simulated results are given. From the simulated results, IP mutation frequency is the key to increase consumptions of adversaries, while the IP mutation pool is not the principal factor to thwart adversaries in reconnaissance and delivery of CKC steps. For system user operational cost, IP mutation frequency influence legitimate connections in relative values under ideal link state without delay, packet lose and jitter. The simulated model based on SASQF also provides a basic method to find the optimal IP mutation frequency through simulations.

References

  1. Jajodia, S., Ghosh, A. K., Swarup, V., Wang, C., & Wang, X. S. 2011. Moving Target Defense. Springer, New York.Google ScholarGoogle Scholar
  2. Manadhata, P. K., & Wing, J. M. 2011. A formal model for a system's attack surface. Advances in Information Security, 54, 1--28.Google ScholarGoogle Scholar
  3. Anderson, N., Mitchell, R., & Chen, I. R. 2016. Parameterizing Moving Target Defenses. Ifip International Conference on New Technologies, Mobility and Security (NTMS '16). IEEE. Larnaca, Cyprus. 1--6.Google ScholarGoogle Scholar
  4. Ben W. Priest, Era Vuksani, Neal Wagner, Brady Tello, Kevin M. Carter, and William W. Streilein. 2015. Agent-based simulation in support of moving target cyber defense technology development and evaluation. In Proceedings of the 18th Symposium on Communications & Networking (CNS '15). Society for Computer Simulation International, San Diego, CA, USA, 16-23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Hoda Maleki, Saeed Valizadeh, William Koch, Azer Bestavros, and Marten van Dijk. 2016. Markov Modeling of Moving Target Defense Games. In Proceedings of the 2016 ACM Workshop on Moving Target Defense (MTD '16). ACM, New York, NY, USA, 81--92. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Leeuwen, B. P. V., Stout, W. M. S., & Urias, V. E. 2016. Empirical assessment of network-based Moving Target Defense approaches. Military Communications Conference, Milcom 2016. IEEE. Baltimore, MD, USA. 764--769.Google ScholarGoogle ScholarCross RefCross Ref
  7. Soule, N., Simidchieva, B., Yaman, F., Watro, R., Loyall, J., & Atighetchi, M., et al. 2015. Quantifying & minimizing attack surfaces containing moving target defenses. Resilience Week. IEEE. Philadelphia, PA, USA. 1--6.Google ScholarGoogle Scholar
  8. Jones, S. T., Outkin, A. V., Gearhart, J. L., Hobbs, J. A., Siirola, J. D., & Phillips, C. A., et al. 2015. Evaluating moving target defense with PLADD. Technical Report. Sandia National Laboratories in Albuquerque.Google ScholarGoogle Scholar
  9. Zhuang, R. 2015. A theory for understanding and quantifying moving target defense. Dissertations & Theses - Gradworks.Google ScholarGoogle Scholar
  10. Kun Sun and Sushil Jajodia. 2014. Protecting Enterprise Networks through Attack Surface Expansion. In Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation (SafeConfig '14). ACM, New York, NY, USA, 29--32. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Leeuwen, B. V., Stout, W. M. S., & Urias, V. 2015. Operational cost of deploying Moving Target Defenses defensive work factors. Military Communications Conference, Milcom 2015. IEEE. Tampa, FL, USA, 966--971.Google ScholarGoogle ScholarCross RefCross Ref
  12. Yadav, T., & Rao, A. M. 2015. Technical Aspects of Cyber Kill Chain. Security in Computing and Communications. Springer International Publishing.Google ScholarGoogle Scholar

Index Terms

  1. A System Attack Surface Based MTD Effectiveness and Cost Quantification Framework

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICCSP 2018: Proceedings of the 2nd International Conference on Cryptography, Security and Privacy
          March 2018
          187 pages
          ISBN:9781450363617
          DOI:10.1145/3199478

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 16 March 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader