2021
DOI: 10.1155/2021/8848473
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector

Abstract: Scanning attack is normally the first step of many other network attacks such as DDoS and propagation worm. Because of easy implementation and high returns, scanning attack especially cooperative scanning attack is widely used by hackers, which has become a serious threat to network security. In order to defend against scanning attack, this paper proposes an adaptive IP hopping in software defined network for moving target defense (MTD). In order to accurately respond to attacker’s behavior in real time, a lig… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 32 publications
0
10
0
Order By: Relevance
“…The MTD technique presented in [72] is based on IP hopping triggered by a timer or a detector, utilizing a lightweight convolutional neural network to detect threats. The architecture takes a multistep process to decide its strategy.…”
Section: Address and Port Mutationmentioning
confidence: 99%
See 1 more Smart Citation
“…The MTD technique presented in [72] is based on IP hopping triggered by a timer or a detector, utilizing a lightweight convolutional neural network to detect threats. The architecture takes a multistep process to decide its strategy.…”
Section: Address and Port Mutationmentioning
confidence: 99%
“…Out of the architectures utilizing SDN, by far the most popular choice to implement them was by using Mininet [124], although the choice of SDN controllers varied greatly. Among the most popular controllers used throughout the surveyed literature were POX [125], used by [94,101,109,112] and Ryu [59] used in [72,74,79,84]. Other choices of controllers include ONOS [55], which appeared in [73,86,120].…”
Section: Testbedsmentioning
confidence: 99%
“…Hence, it is not a favorable way to categorize intelligent MTD techniques according to SDR/Five layers for the introduction. RL [34] Towards optimized RL [60][61][62][63][64][65][66][67][68] Towards self-adaptive DL [69] CNN [19] Neuro-evolution [14] Clustering [48] RL [36] RNN [70] 3.2.1. Towards Affordable One of the primary goals of MTD is to provide an affordable defense.…”
mentioning
confidence: 99%
“…As a feasible solution to the IP hopping issue proposed in Section 2.3.4. Xu et al [19] proposed a CNN-based adaptive IP hopping approach to defending against scanning attacks. To achieve lightweight defense, they first compressed the CNN detector deployed in the control plane using deep compression techniques to reduce its storage and computational resource usage, improve its forward computational efficiency, and release its dependence on GPU computation cards in its usage phase.…”
mentioning
confidence: 99%
See 1 more Smart Citation