Multi-dimensional host identity anonymization for defeating skilled attackers

Jafar Haadi Jafarian, Amirreza Niakanlahiji, Ehab Al-Shaer, Qi Duan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

26 Scopus citations

Abstract

While existing proactive-based paradigms such as address mutation are effective in slowing down reconnaissance by naive attackers, they are ineffective against skilled human attackers. In this paper, we analytically show that the goal of defeating reconnaissance by skilled human attackers is only achievable by an integration of five defensive dimensions: (1) mutating host addresses, (2) mutating host fingerprints, (3) anonymizing host fingerprints, (4) deploying high-fidelity honeypots with context-aware fingerprints, and (5) deploying context-aware content on those honeypots. Using a novel class of honeypots, referred to as proxy honeypots (high-interaction honeypots with customizable fingerprints), we propose a proactive defense model, called (HIDE), that constantly mutates addresses and fingerprints of network hosts and proxy honeypots in a manner that maximally anonymizes identity of network hosts. The objective is to make a host untraceable over time by not letting even skilled attackers reuse discovered attributes of a host in previous scanning, including its addresses and fingerprint, to identify that host again. The mutations are generated through formal definition and modeling of the problem. Using a red teaming evaluation with a group of white-hat hackers, we evaluated our five-dimensional defense model and compared its effectiveness with alternative and competing scenarios. These experiments as well as our analytical evaluation show that by anonymizing all identifying attributes of a host/honeypot over time, HIDE is able to significantly complicate reconnaissance, even for highly skilled human attackers.

Original languageEnglish
Title of host publicationMTD 2016 - Proceedings of the 2016 ACM Workshop on Moving Target Defense, co-located with CCS 2016
PublisherAssociation for Computing Machinery, Inc
Pages47-58
Number of pages12
ISBN (Electronic)9781450345705
DOIs
StatePublished - 24 Oct 2016
Externally publishedYes
Event2016 ACM Workshop on Moving Target Defense, MTD 2016 - Vienna, Austria
Duration: 24 Oct 2016 → …

Publication series

NameMTD 2016 - Proceedings of the 2016 ACM Workshop on Moving Target Defense, co-located with CCS 2016

Conference

Conference2016 ACM Workshop on Moving Target Defense, MTD 2016
Country/TerritoryAustria
CityVienna
Period24/10/16 → …

Bibliographical note

Publisher Copyright:
© 2016 ACM.

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Multi-dimensional host identity anonymization for defeating skilled attackers'. Together they form a unique fingerprint.

Cite this