DocumentCode :
3703988
Title :
RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries
Author :
Yue-Bin Luo;Bao-Sheng Wang;Xiao-Feng Wang;Xiao-Feng Hu;Gui-Lin Cai;Hao Sun
Author_Institution :
Coll. of Comput., Nat. Univ. of Defense Technol., Changsha, China
Volume :
1
fYear :
2015
Firstpage :
263
Lastpage :
270
Abstract :
Network servers and applications commonly use static IP addresses and communication ports, making themselves easy targets for network reconnaissances and attacks. Port and address hopping is a novel and effective moving target defense (MTD) which hides network servers and applications by constantly changing IP addresses and ports. In this paper, we develop a novel port and address hopping mechanism called Random Port and Address Hopping (RPAH), which constantly and unpredictably mutates IP addresses and communication ports based on source identity, service identity as well as time with high rate. RPAH provides us a more strength and effective MTD mechanism with three hopping frequency, i.e., source hopping, service hopping and temporal hopping. In RPAH networks, the real IPs (rIPs) and real ports (rPorts) remain untouched and packets are routed based on dynamic and temporary virtual IPs (vIPs) of servers. Therefore, messages from adversaries using static, invalid or inactive IP addresses/ports will be detected and denied. Our experiments and evaluation show that RPAH is effective in defense against various internal and external threats such as network scanning, SYN flooding attack and worm propagation, while introducing an acceptable operation overhead.
Keywords :
"Ports (Computers)","Servers","IP networks","Synchronization","Security","Internet","Demultiplexing"
Publisher :
ieee
Conference_Titel :
Trustcom/BigDataSE/ISPA, 2015 IEEE
Type :
conf
DOI :
10.1109/Trustcom.2015.383
Filename :
7345291
Link To Document :
بازگشت