A formal verification of configuration-based mutation techniques for moving target defense

Muhammad Abdul Basit Ur Rahim*, Ehab Al-Shaer, Qi Duan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Static system configuration provides a significant advantage for the adversaries to discover the assets and vulnerabilities in the system and launch attacks. Configuration-based moving target defense (MTD) reverses the cyber warfare asymmetry for the defenders’ advantage by mutating certain configuration parameters proactively in order to disrupt attacks planning or increase the attack cost significantly. A key challenge in developing MTD techniques is guaranteeing design correctness and operational integrity. Due to the dynamic, asynchronous, and distributed nature of moving target defense, various mutation actions can be executed in an interleaved manner causing failures in the defense mechanism itself or negative interference in the cyber operations. Therefore, it is important to verify the correctness and operational integrity, of moving target techniques to identify the design errors or inappropriate run-time behavior that might jeopardize the effectiveness of MTD or cyber operations. To the best of our knowledge, there is no work aiming for the formal verification of the design correctness and integrity of moving target defense techniques. In this paper, we present a methodology for formal verification of configuration based moving target defense. We model the system behaviors with system modeling language (SysML) and formalize the MTD technique using du-ration calculus (DC). The formal model satisfies the constraints and de-sign correctness properties. We use the random host mutation (RHM) as a case study of the MTD system that randomly mutates the IP addresses to make end-hosts untraceable by scanners. We validate the design correctness of RHM using model checking over various configuration-based mutation parameters.

Original languageEnglish
Title of host publicationSecurity and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Proceedings
EditorsNoseong Park, Kun Sun, Sara Foresti, Kevin Butler, Nitesh Saxena
PublisherSpringer Science and Business Media Deutschland GmbH
Pages61-79
Number of pages19
ISBN (Print)9783030630850
DOIs
StatePublished - 2020
Externally publishedYes
Event16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020 - Washington, United States
Duration: 21 Oct 202023 Oct 2020

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume335
ISSN (Print)1867-8211

Conference

Conference16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020
Country/TerritoryUnited States
CityWashington
Period21/10/2023/10/20

Bibliographical note

Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2020.

Keywords

  • Configuration-based mutation
  • Formal specification
  • Moving target defense
  • Verification

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A formal verification of configuration-based mutation techniques for moving target defense'. Together they form a unique fingerprint.

Cite this