2008 IEEE International Conference on Networking, Sensing and Control 2008
DOI: 10.1109/icnsc.2008.4525425
|View full text |Cite
|
Sign up to set email alerts
|

Full Service Hopping for Proactive Cyber-Defense

Abstract: Inspired by deceptive and evasive countermeasures for military environment, a proactive cyber defense tactic of full service hopping is proposed which changes all the service information pseudo-randomly, including service port, network address, service slot, cryptographic algorithm and even the service protocol. A novel concept of dynamic honey pot is presented which mimics the ancient battle diagrams to bewilder the adversary by changing the role of every hopping station pseudo-randomly. Thereafter a full ser… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…In order to expand the poor portability and scalability of the tactic in [22], they introduce a full service hopping framework implemented through mobile java agent in [23], and design a spokesman scheme to solve the problem of precise time synchronization. However, they make a too strong assumption that attackers know nothing about the hopping algorithm, and they didn't give any detailed information about the hopping algorithm.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In order to expand the poor portability and scalability of the tactic in [22], they introduce a full service hopping framework implemented through mobile java agent in [23], and design a spokesman scheme to solve the problem of precise time synchronization. However, they make a too strong assumption that attackers know nothing about the hopping algorithm, and they didn't give any detailed information about the hopping algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…Although paper [20] tries to introduce spatial mutation to increase its effectiveness, but do not consider port mutation which restricts its applicability. The port and address hopping works [21]- [23] combines port hopping and address mutation to increase their defense ability by simultaneously hopping port and address. Nevertheless, they do not provide detailed algorithms and implementations, and they usually consider one kind of hopping, i.e., temporal hopping, which restricts its applicability against coordinated attack models.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation