earticle

논문검색

Analysis of Port Hopping for Proactive Cyber Defense

초록

영어

Port hopping is a typical proactive cyber defense technology, which hides the service identity and confuses attackers during reconnaissance by constantly altering service ports. Although several kinds of port hopping mechanisms have been proposed and implemented, but it is still unknown how effective port hopping is and under what circumstances it is a viable moving target defense because the existed works are limited and they usually discuss only a few parameters. Besides, in many cases the defense effectiveness has been studied empirically. In order to have an insight into the effectiveness of port hopping, this paper introduces a quantitative analysis based on the urn model, which quantifies the probability of attacker success in terms of port pool size, number of probes, number of vulnerable services, and hopping frequency. Theoretical analysis shows that port hopping is an effective and promising proactive defense technology in thwarting cyber attacks.

목차

Abstract
 1. Introduction
 2. Motivation and Related Works
 3. Analytical Models
  3.1. Model Abstraction
  3.2. Parameters and Assumptions
  3.3. Static Ports
  3.4. Perfect Port Hopping
 4. Analysis of Hopping Defenses
  4.1. Port Pool Size
  4.2. Number of Probes
  4.3. Number of Vulnerable Services
  4.4. Hopping Frequency
 5. Conclusions
 Acknowledgements
 References

저자정보

  • Yue-Bin Luo College of Computer, National University of Defense Technology 410073 Changsha, China
  • Bao-Sheng Wang College of Computer, National University of Defense Technology 410073 Changsha, China
  • Gui-Lin Cai College of Computer, National University of Defense Technology 410073 Changsha, China

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.