Abstract
The static address configuration of networks and hosts allows attackers to have enough time to discover target networks and systems. On the other hands, the defenders always lack of time to respond because they can take action after attacker’s explicit behaviors. To eliminate the attacker’s asymmetric advantage of time, randomization of addresses have been suggested as Moving Target Defense (MTD) which is a promising technique to make the attacker’s reconnaissance activities difficult by dynamically changing network properties. In this paper, I propose the address mutation scheme using vector projection for tactical wireless networks that are a leader node centric hierarchical structure. In the proposed scheme, the addresses in the same networks are mutated with a simple vector operation by fully distributed manner and the mutated addresses are shared to all the members in the internal networks. Unlike the conventional schemes, all addresses associated with network entities for data delivery are mutated. I evaluate the performance of the proposed scheme by numerical analysis and experimental simulations. The results show that the proposed scheme could effectively randomize the addresses in tactical wireless networks.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Beraud, P., Cruz, A., Hassell, S., Meadows, S.: Using cyber maneuver to improve network resiliency. In: 2011 - MILCOM 2011 Military Communications Conference, Baltimore, MD, pp. 1121–1126 (2011)
Carroll, T.E., Crouse, M., Fulp, E.W., Berenhaut, K.S.: Analysis of network address shuffling as a moving target defense. In: 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, pp. 701–706 (2014)
Wang, S., Zhang, L., Tang, C.: A new dynamic address solution for moving target defense. In: 2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference, Chongqing, pp. 1149–1152 (2016)
Tang, H., Sun, Q.T., Yang, X., Long, K.: A network coding and DES based dynamic encryption scheme for moving target defense. IEEE Access 6, 26059–26068 (2018)
Cai, G.-L., Wang, B.-S., Hu, W., Wang, T.-Z.: Moving target defense: state of the art and characteristics. Front. Inf. Technol. Electron. Eng. 17(3), 1122–1153 (2016)
Sun, J., Sun, K.: DESIR: Decoy-enhanced seamless IP randomization. In: IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, pp. 1–9 (2016)
Luo, Y.B., Wang, B.S., Wang, X.F., Hu, X.F., Cai, G.L., Sun, H.: RPAH: random port and address hopping for thwarting internal and external adversaries. In: 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, pp. 263–270 (2015)
Wu, J.: Meaning and vision of mimic computing and mimic security defense. Telecommun. Sci. 30(7), 17 (2014)
Jafarian, J.H., Al-Shaer, E., Duan, Q.: An effective address mutation approach for disrupting reconnaissance attacks. IEEE Trans. Inf. Forensics Secur. 10(12), 2562–2577 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Lee, JK. (2019). IP Address Mutation Scheme Using Vector Projection for Tactical Wireless Networks. In: Kang, B., Jang, J. (eds) Information Security Applications. WISA 2018. Lecture Notes in Computer Science(), vol 11402. Springer, Cham. https://doi.org/10.1007/978-3-030-17982-3_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-17982-3_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17981-6
Online ISBN: 978-3-030-17982-3
eBook Packages: Computer ScienceComputer Science (R0)