Proactive routing mutation against stealthy Distributed Denial of Service attacks: metrics, modeling, and analysis
Qi Duan,
Ehab Al-Shaer,
Samrat Chatterjee,
Mahantesh Halappanavar and
Christopher Oehmen
The Journal of Defense Modeling and Simulation, 2018, vol. 15, issue 2, 219-230
Abstract:
Infrastructure Distributed Denial of Service (IDDoS) attacks continue to be one of the most devastating challenges facing cyber systems. The new generation of IDDoS attacks exploits the inherent weakness of cyber infrastructure, including the deterministic nature of routing, skewed distribution of flows, and Internet ossification to discover the network critical links and launch highly stealthy flooding attacks that are not observable at the victim’s end. In this paper, first, we propose a new metric to quantitatively measure the potential susceptibility of any arbitrary target server or domain to stealthy IDDoS attacks, and estimate the impact of such susceptibility on enterprises. Second, we develop proactive route mutation techniques to minimize the susceptibility to these attacks by dynamically changing the flow paths periodically to invalidate the adversary knowledge about the network and avoid targeted critical links. Our proposed approach actively changes these network paths while satisfying security and Quality of Service requirements. We implemented the proactive path mutation technique on a Software Defined Network using the OpenDaylight controller to demonstrate a feasible deployment of this approach. Our evaluation validates the correctness, effectiveness, and scalability of the proposed approaches.
Keywords: Proactive route mutation; Distributed Denial of Service attack; vulnerability metric; Mutation Protection Effectiveness (search for similar items in EconPapers)
Date: 2018
References: View complete reference list from CitEc
Citations:
Downloads: (external link)
https://journals.sagepub.com/doi/10.1177/1548512917731002 (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:sae:joudef:v:15:y:2018:i:2:p:219-230
DOI: 10.1177/1548512917731002
Access Statistics for this article
More articles in The Journal of Defense Modeling and Simulation
Bibliographic data for series maintained by SAGE Publications ().