2020
DOI: 10.48550/arxiv.2005.04220
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Proactive Defense for Internet-of-Things: Integrating Moving Target Defense with Cyberdeception

Mengmeng Ge,
Jin-Hee Cho,
Dong Seong Kim
et al.

Abstract: Resource constrained Internet-of-Things (IoT) devices are highly likely to be compromised by attackers because strong security protections may not be suitable to be deployed. This requires an alternative approach to protect vulnerable components in IoT networks. In this paper, we propose an integrated defense technique to achieve intrusion prevention by leveraging cyberdeception (i.e., a decoy system) and moving target defense (i.e., network topology shuffling). We verify the effectiveness and efficiency of ou… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…An adaptive honeynets based on Partially Observable MDP (POMDP) was discussed in [17]. An integrated defense technique for Internet-of-Things (IOT) to achieve intrusion prevention using decoy system with moving target defense was presented in [18]. An adaptive deception technology for APT29 and APT3 scenario descriptions in the MITRE ATT&CK was proposed in [19].…”
Section: Defensive Deception Technologymentioning
confidence: 99%
“…An adaptive honeynets based on Partially Observable MDP (POMDP) was discussed in [17]. An integrated defense technique for Internet-of-Things (IOT) to achieve intrusion prevention using decoy system with moving target defense was presented in [18]. An adaptive deception technology for APT29 and APT3 scenario descriptions in the MITRE ATT&CK was proposed in [19].…”
Section: Defensive Deception Technologymentioning
confidence: 99%
“…Many research efforts have been devoted to developing efficient MTD mechanisms, architectures, and strategies. Existing efforts target specific technologies such as Cloud [43], Software Defined Networks (SDN) [42,[44][45][46], SCADA systems, and IoT [47]. Despite this diversity, most developed technologies share common procedural guidelines and stages.…”
Section: Motivationmentioning
confidence: 99%
“…In proactive defense, the move is carried out based on periodic time intervals or random selection of the time interval that might be done using either periodic or random time series [45], this method depends on the time interval and might degrade the performance if the time interval is short [46]. In the hybrid approach, both reactive and proactive approaches might be used together, this will allow the change upon some time interval and will also carry out the change based on an alert from the IDS or firewall that might enhance the security [51].…”
Section: Moving Adaptationsmentioning
confidence: 99%
“…Existing MTD and N-MTD have been studied to avoid invasion attempts proactively or to improve metrics and variables with a focus on the attenuation of the defender's diversified attack and exploration surface, and then apply it in applied domains, such as IoT [44], cloud [45], and cyber physical systems [46]. Our reason for selecting an MTD mutation cycle using LPC-MTD was to ease the operational deceptive limitations of existing MTD, and to enhance the lack of reactive responses.…”
Section: Lpc-mtdmentioning
confidence: 99%