Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2602087.2602100acmotherconferencesArticle/Chapter ViewAbstractPublication PagescisrcConference Proceedingsconference-collections
research-article

An initial framework for evolving computer configurations as a moving target defense

Published: 08 April 2014 Publication History

Abstract

An evolutionary process encourages a system to change, and hopefully improve, based on environmental feed-back. When applied to a computer system, an evolutionary inspired process can be used to discover computer configurations that are different and potentially more secure. These configurations can be instantiated at different times to create a Moving Target Defense (MTD), where attackers must contend with a system that constantly changes and improves.
This paper describes an initial Python-based framework that creates an evolutionary inspired MTD for computers. The framework consists of three interacting components. An evolutionary component discovers computer configurations based on previous configurations. Another component vets new configurations by instantiating them using virtual machines. Finally, a third process uses a combination of penetration software as well as reports from actual attacks to assess the configurations. The framework has been used to provide a MTD for RedHat® installed Apache™1 web servers. Experimental results indicate the servers are on average diverse, functional, and increasingly more secure.

References

[1]
Michael B. Crouse and Errin W. Fulp. A moving target environment for computer configurations using genetic algorithms. In Proceedings of the 4th Symposium on Configuration Analytics and Automation (SafeConfig 2011), 2011.
[2]
Renaud Deraison. Nessus: remote security scanner. http://www.nessus.org/.
[3]
Carsten Eiram and Brian Martin. The CVSSv2 shortcomings, faults, and failures formulation. Technical report, Forum of Incident Response and Security Teams (FIRST), 2013.
[4]
Dorene Kewley, Russ Fink, John Lowry, and Mike Dean. Dynamic approaches to thwart adversary intelligence gathering. In Proc. of the DARPA Information Survivability Conference & Exposition II (DISCEX '01), volume 1, pages 176--185, 2001.
[5]
Peter Mell, Karen Scarfone, and Sasha Romanosky. A complete guide to the common vulnerability scoring system version 2.0. http://www.first.org/cvss/cvss-guide.pdf, 2007.
[6]
Melanie Mitchell. An Introduction to Genetic Algorithms. MIT Press, Cambridge, MA, USA, 1998.
[7]
NIST. Consensus security configuration checklist. http://web.nvd.nist.gov/view/ncp/repository.
[8]
Jon Oberheide, Evan Cooke, and Farnam Jahanian. If it ain't broke, don't fix it: challenges and new directions for inferring the impact of software patches. In Proceedings of the 12th conference on Hot topics in operating systems, 2009.

Cited By

View all
  • (2023)Enhancing Network Security Through Moving Target Defense Technology: An Analysis of the Impact on Attack Level2023 7th International Conference on Internet of Things and Applications (IoT)10.1109/IoT60973.2023.10365374(1-6)Online publication date: 25-Oct-2023
  • (2022)Dynamic defenses in cyber security: Techniques, methods and challengesDigital Communications and Networks10.1016/j.dcan.2021.07.0068:4(422-435)Online publication date: Aug-2022
  • (2021)OSINT-Based LPC-MTD and HS-Decoy for Organizational Defensive DeceptionApplied Sciences10.3390/app1108340211:8(3402)Online publication date: 10-Apr-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CISR '14: Proceedings of the 9th Annual Cyber and Information Security Research Conference
April 2014
134 pages
ISBN:9781450328128
DOI:10.1145/2602087
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • CEDS: DOE Cybersecurity for Energy Delivery Systems
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • CSL: DOE Cyber Sciences Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Pacific Northwest National Laboratory
  • TTP: DHS Transition to Practice
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 April 2014

Check for updates

Author Tags

  1. computer configuration
  2. moving target defense
  3. security

Qualifiers

  • Research-article

Funding Sources

Conference

CISR' '14
Sponsor:
  • Los Alamos National Labs
  • CEDS
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • CSL
  • Argonne Natl Lab
  • TTP
  • Nevada National Security Site

Acceptance Rates

CISR '14 Paper Acceptance Rate 32 of 50 submissions, 64%;
Overall Acceptance Rate 69 of 136 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)2
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Enhancing Network Security Through Moving Target Defense Technology: An Analysis of the Impact on Attack Level2023 7th International Conference on Internet of Things and Applications (IoT)10.1109/IoT60973.2023.10365374(1-6)Online publication date: 25-Oct-2023
  • (2022)Dynamic defenses in cyber security: Techniques, methods and challengesDigital Communications and Networks10.1016/j.dcan.2021.07.0068:4(422-435)Online publication date: Aug-2022
  • (2021)OSINT-Based LPC-MTD and HS-Decoy for Organizational Defensive DeceptionApplied Sciences10.3390/app1108340211:8(3402)Online publication date: 10-Apr-2021
  • (2020)A critical view on moving target defense and its analogiesProceedings of the 17th ACM International Conference on Computing Frontiers10.1145/3387902.3397225(277-283)Online publication date: 11-May-2020
  • (2020)Delivering diverse web server configuration in a moving target defense using evolutionary algorithmsProceedings of the 2020 Genetic and Evolutionary Computation Conference Companion10.1145/3377929.3398083(1520-1527)Online publication date: 8-Jul-2020
  • (2020)Vulnerability coverage for adequacy security testingProceedings of the 35th Annual ACM Symposium on Applied Computing10.1145/3341105.3374099(540-543)Online publication date: 30-Mar-2020
  • (2020)ConfigRand: A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud2020 IEEE 22nd International Conference on High Performance Computing and Communications; IEEE 18th International Conference on Smart City; IEEE 6th International Conference on Data Science and Systems (HPCC/SmartCity/DSS)10.1109/HPCC-SmartCity-DSS50907.2020.00104(794-801)Online publication date: Dec-2020
  • (2020)Toward Proactive, Adaptive Defense: A Survey on Moving Target DefenseIEEE Communications Surveys & Tutorials10.1109/COMST.2019.296379122:1(709-745)Online publication date: Sep-2021
  • (2020)Improving evolution of service configurations for moving target defense2020 IEEE Congress on Evolutionary Computation (CEC)10.1109/CEC48606.2020.9185786(1-8)Online publication date: Jul-2020
  • (2020)Using Evolutionary Algorithms for Server Hardening via the Moving Target Defense TechniqueApplications of Evolutionary Computation10.1007/978-3-030-43722-0_43(670-685)Online publication date: 9-Apr-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media