Skip to main content

2013 | OriginalPaper | Buchkapitel

6. Applying Self-Shielding Dynamics to the Network Architecture

verfasst von : Justin Yackoski, Harry Bullen, Xiang Yu, Jason Li

Erschienen in: Moving Target Defense II

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The static nature of computer networks allows attackers to gather intelligence, perform planning, and then execute attacks at will. Further, once an attacker has gained access to a node within an enclave, there is little to stop a determined attacker from mapping out and spreading to other hosts and services within the enclave. To reduce the impact and spread of an attack before it is detected and removed, semantic changes can be made to several fundamental aspects of the network in order to create cryptographically-strong dynamics. In this chapter, we describe such an architecture designed on top of IPv6 for a wired network enclave. User and operating system impacts are mitigated through the use of a hypervisor, and the dynamics remain compatible with existing network infrastructure. At the same time, an attacker’s ability to plan, spread, and communicate within the network is significantly limited by the imposed dynamics.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat S. M. Bellovin, A. Keromytis, and B. Cheswick, “Worm propagation strategies in an IPv6 Internet,” ;login:, pp. 70–76, February 2006. S. M. Bellovin, A. Keromytis, and B. Cheswick, “Worm propagation strategies in an IPv6 Internet,” ;login:, pp. 70–76, February 2006.
3.
Zurück zum Zitat W. J. Lynn, “Defending a new domain,” Foreign Affairs, vol. 5, no. 89, September/October 2010. W. J. Lynn, “Defending a new domain,” Foreign Affairs, vol. 5, no. 89, September/October 2010.
4.
Zurück zum Zitat P. Dasgupta, C. K. S., and S. K. Gupta, “Vulnerabilities of PKI based smartcards,” in Proc. of IEEE Military Communications Conference (MILCOM), Orlando, FL, USA, October 2007. P. Dasgupta, C. K. S., and S. K. Gupta, “Vulnerabilities of PKI based smartcards,” in Proc. of IEEE Military Communications Conference (MILCOM), Orlando, FL, USA, October 2007.
6.
Zurück zum Zitat J. Yackoski, P. Xie, H. Bullen, J. Li, and K. Sun, “A self-shielding dynamic network architecture,” in MILCOM, Baltimore, MD, USA, November 2011. J. Yackoski, P. Xie, H. Bullen, J. Li, and K. Sun, “A self-shielding dynamic network architecture,” in MILCOM, Baltimore, MD, USA, November 2011.
7.
Zurück zum Zitat T. D. Morgan, “IPv6 address cookies: Mitigating spoofed attacks in the next generation internet,” Master’s thesis, Northwestern University, 2006. T. D. Morgan, “IPv6 address cookies: Mitigating spoofed attacks in the next generation internet,” Master’s thesis, Northwestern University, 2006.
8.
Zurück zum Zitat T. Narten, G. Huston, and L. Roberts, “IPv6 Address Assignment to End Sites,” RFC 6177 (Best Current Practice), Internet Engineering Task Force, Mar. 2011. T. Narten, G. Huston, and L. Roberts, “IPv6 Address Assignment to End Sites,” RFC 6177 (Best Current Practice), Internet Engineering Task Force, Mar. 2011.
9.
Zurück zum Zitat S. Kent and K. Seo, “Security Architecture for the Internet Protocol,” RFC 4301 (Proposed Standard), Internet Engineering Task Force, Dec. 2005. S. Kent and K. Seo, “Security Architecture for the Internet Protocol,” RFC 4301 (Proposed Standard), Internet Engineering Task Force, Dec. 2005.
10.
Zurück zum Zitat A. Lenstra and E. Verheul, “Selecting cryptographic key size,” Cryptography, vol. 14, no. 4, pp. 255–293, 2001. A. Lenstra and E. Verheul, “Selecting cryptographic key size,” Cryptography, vol. 14, no. 4, pp. 255–293, 2001.
Metadaten
Titel
Applying Self-Shielding Dynamics to the Network Architecture
verfasst von
Justin Yackoski
Harry Bullen
Xiang Yu
Jason Li
Copyright-Jahr
2013
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-5416-8_6

Premium Partner