5
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      A Hybrid Cyber Defense Mechanism to Mitigate the Persistent Scan and Foothold Attack

      1 , 2 , 2 , 3 , 1 , 1 , 1
      Security and Communication Networks
      Hindawi Limited

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          As the prerequisite for the attacker to invade the target network, Persistent Scan and Foothold Attack (PSFA) is becoming progressively more subtle and complex. Even worse, the static and predictable characteristics of traditional systems provide an asymmetric advantage for attackers in launching the PSFA. To reverse this asymmetric advantage and resist the PSFA, two new defense ideas, called moving target defense (MTD) and deception-based cyber defense (DCD), have been suggested to provide the proactive selectable measures to complement traditional defense. However, MTD is unable to defeat the sophisticated attacker with fingerprint tracking ability. Meanwhile, DCD is easy to be marked by the attacker, which will result in a great waste of defense resources and poor defense effectiveness. To address this shortcoming, we propose the hybrid cyber defense mechanism that combines the address mutation (belonging to MTD) and fingerprint camouflage (belonging to DCD) strategies. More specifically, we first introduce and formalize the attacker model of PSFA based on the cyber kill chain. Afterwards, the traffic direction technology is designed to realize the coordination between the strategy of address mutation and the strategy of fingerprint camouflage. Furthermore, we construct the fine-grained quantitative modeling of the attacker’s behaviors through an in-depth observation of actual network confrontation. Based on this, a dynamic defense strategy generation algorithm is presented to maximize the effectiveness of our hybrid mechanism. Finally, the experimental results show that our hybrid mechanism can greatly improve the time required for a successful attack and achieve a better defense effect than the single strategy.

          Related collections

          Most cited references18

          • Record: found
          • Abstract: not found
          • Article: not found

          A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Industrial Control Systems: Cyberattack trends and countermeasures

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Assessing the Effectiveness of Moving Target Defenses Using Security Models

                Bookmark

                Author and article information

                Contributors
                Journal
                Security and Communication Networks
                Security and Communication Networks
                Hindawi Limited
                1939-0122
                1939-0114
                October 20 2020
                October 20 2020
                : 2020
                : 1-15
                Affiliations
                [1 ]Information Science and Technology Institute, Zhengzhou 450001, China
                [2 ]State Key Laboratory of Integrated Services Network, Xidian University, Xi’an 710071, China
                [3 ]Shaanxi Key Laboratory of Blockchain and Secure Computing, Xidian University, Xi’an 710071, China
                Article
                10.1155/2020/8882200
                3eccfbf1-493e-48e9-8f91-06bbbdd617be
                © 2020

                https://creativecommons.org/licenses/by/4.0/

                History

                Comments

                Comment on this article