Computer networks may never float like a butterfly, but Penn State information scientists suggest that creating nimble networks that can sense jabs from hackers could help deflect the stinging blows of those attacks.
“Because of the static nature of a computer network, the attacker has a time advantage,” said Dinghao Wu, assistant professor of information sciences and technology. “Hackers can spend a month, two months, six months or more just studying the network and finding vulnerabilities. When they return to use that information to attack, the network typically has not changed and those vulnerabilities are still there, too.”
The researchers, who release their findings at the Information Security Conference held in Honolulu today (Sept. 8), created a computer defense system that senses possible malicious probes of the network and then redirects that attack to a virtual network that offers little information about the real network.
Typically, the first step a hacker takes when attacking a network is a probe to gain information about the system — for example, what software types and versions, operating systems and hardware the network is running. Instead of trying to stop these hackers’ scans, researchers set up a detector to monitor incoming web traffic to determine when hackers are scanning the network.
“We can’t realistically stop all scanning activities, but we can usually tell when a malicious scan is happening,” said Wu. “If it’s a large-scale scan, it is usually malicious.”
Once a malicious scan is detected, the researchers use a network device — called a reflector — to redirect that traffic to a decoy, or shadow network, according to Li Wang, a doctoral candidate in information sciences and technology, who worked with Wu. The shadow network is isolated and invisible from the real network, but can mimic the structure of a physical network to fool the hackers into believing they are receiving information about an actual network.
“A typical strategy would be to create a shadow network environment that has the same look as the protection domain,” said Wang. “It can have the same number of nodes, network topology and configurations to fool the hacker. These shadow networks can be created to simulate complex network structures.”
The system, which is a type of defense known in the computer industry as a moving target defense, also gives network administrators the option to more easily change parts of the shadow network’s virtual system, making it even more difficult for hackers to assess the success of their scans.
Because the reflector can act as a regular network device when no malicious attacks are present, there should be little effect on the real network’s performance and functionality, according to Wu.
The researchers created a prototype for the system and tested it on a simulated network that runs on a computer — a virtual local area network. This allowed them to simulate both the attack and defense without using an actual network. The prototype was able to sense the incoming scan and deflect it to a shadow network.
According to the researchers, the information that was gathered from the attack scan only produced information from the shadow network.
Wu said the next step is to deploy the system in an actual network.
The Latest on: Moving target defense
[google_news title=”” keyword=”Moving target defense” num_posts=”10″ blurb_length=”0″ show_thumb=”left”]
via Google News
The Latest on: Moving target defense
- Israeli hostage killed by Hamas as IDF strikes hundreds of targets in Gaza Stripon December 9, 2023 at 2:00 am
A 53-year-old Israeli taxi driver who was kidnapped by Hamas on Oct. 7 has been murdered, the Bat Yam municipality announced Friday in a statement obtained by Fox News.
- 10 QUESTIONS WITH TWENTYMAN: What improvements can Lions make on defense?on December 8, 2023 at 3:00 am
Tim Twentyman answers 10 fan-submitted questions as the Detroit Lions prepare for their Week 14 matchup vs. the Chicago Bears.
- Moving beyond launch: Realizing the benefits of the new space economyon December 8, 2023 at 2:51 am
The space economy now has moved far beyond just the government, with industry taking humanity off-world, to stay ...
- Best USC football transfer portal targets for Lincoln Rileyon December 7, 2023 at 6:43 am
After going 7-5 this season, the USC football team needs to utilize the transfer portal for some help, specifically on defense. The 2023 college football season was a disappointment for the USC ...
- Kyle Shanahan’s 49ers offense has answers for everything a defense throws at iton December 7, 2023 at 5:00 am
Film review shows San Francisco attacking all weaknesses thanks to smart schemes, numerous weapons and a confident QB.
- U.S. Tests Missile Seeker System That Won't Let Go of Its Target No Matter Whaton December 7, 2023 at 3:02 am
They say a warfighting platform such as a fighter aircraft is only as good as the pilots that fly it and the weapons they carry. When it comes to the ...
- House set to weigh warrantless spy powers as part of defense policy billon December 6, 2023 at 2:04 pm
The House will consider a short-term extension of the nation’s warrantless surveillance powers as part of the defense policy bill, House intelligence leaders confirmed Wednesday. The National ...
- Ukraine signals a shift toward defense as analysts ask whether 'failed counteroffensive' is overon December 5, 2023 at 8:57 pm
Ukraine signaled it's shifting its military tactics to a more defensive footing after an analysis of Russia's resource capabilities, and as winter arrives.
- 3 Maple Leafs Defense Targets After Zadorov Tradeon December 5, 2023 at 5:35 am
With Nikita Zadorov off the board, Toronto Maple Leafs general manager Brad Treliving still has some intriguing options to target on defence.
via Bing News