2015 IEEE Conference on Computer Communications (INFOCOM) 2015
DOI: 10.1109/infocom.2015.7218443
|View full text |Cite
|
Sign up to set email alerts
|

Adversary-aware IP address randomization for proactive agility against sophisticated attackers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 48 publications
(33 citation statements)
references
References 15 publications
0
33
0
Order By: Relevance
“…The OF-RHM/RHM research team has been conducting ongoing research based on RHM [15][16][17]. HIDE, the latest research area of the RHM research team, includes fingerprint mutation and attack surface expansion, operating a honeypot cloud as well as network address mutation on the RHM network model.…”
Section: Hidementioning
confidence: 99%
“…The OF-RHM/RHM research team has been conducting ongoing research based on RHM [15][16][17]. HIDE, the latest research area of the RHM research team, includes fingerprint mutation and attack surface expansion, operating a honeypot cloud as well as network address mutation on the RHM network model.…”
Section: Hidementioning
confidence: 99%
“…1) IP address translation. OpenFlow Random Host Mutation (OF-RHM) and Random Host Mutation (RHM) [12,13] are the virtual address random transformation technology proposed by alshaer et al OF-RHM is applied to SDN network, and provides the random virtual IP allocated by OpenFlow, and the translation of real IP and virtual IP is performed by the OF-RHM. The network structure of OF-RHM is shown as figure 2.…”
Section: Mechanism Based On Random Translationmentioning
confidence: 99%
“…Jafarian et al [10] used the OpenFlow protocol to develop an MTD architecture that transparently mutates IP addresses with high unpredictability, which is able to maintain configuration integrity and minimize operation overhead. Jafarian et al [11] also presented a novel MTD technique that enables the host-to-IP binding of each destination host to vary randomly across the network based on the source identity and time. The integration of both spatial and temporal mutations could effectively defeat various reconnaissance-based threat models, ranging from naive IP sharing techniques to sophisticated advanced persistent threats.…”
Section: Related Workmentioning
confidence: 99%