Skip to main content

Scalable Network Diversity Modeling For Assessing Threats in Cloud Networks

  • 683 Accesses

Part of the Wireless Networks book series (WN)

Abstract

Network diversity based security metric is attracting increasing interest in cybersecurity research community. There have been several efforts towards network diversity modeling, for the purpose of evaluating a network’s robustness against potential attacks. However, those efforts commonly use traditional network resource graph abstraction to model network diversity, which are not scalable when applied to modern large scaled networked systems, which can be encountered in cloud environments. In this chapter, we introduce a hierarchical network resource graph abstraction method to improve the scalability of network diversity modeling. Specifically, we use a two-layer hierarchy to separate the network topology information (in the upper layer) from the resource information of each host (in the lower layer). Simulations show that the proposed approach is scalable for larger sized networked systems.

Keywords

  • Network System
  • Closeness Centrality
  • Network Diversity
  • Attack Scenario
  • Attack Graph

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
EUR   29.95
Price includes VAT (Finland)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR   42.79
Price includes VAT (Finland)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR   54.99
Price includes VAT (Finland)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
EUR   54.99
Price includes VAT (Finland)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions
Fig. 3.1
Fig. 3.2
Fig. 3.3
Fig. 3.4
Fig. 3.5
Fig. 3.6
Fig. 3.7
Fig. 3.8
Fig. 3.9
Fig. 3.10
Fig. 3.11

References

  1. J. Xu, P. Guo, M. Zhao, R. F. Erbacher, M. Zhu, and P. Liu, “Comparing different moving target defense techniques,” in Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014, pp. 97–107.

    Google Scholar 

  2. L. Wang, M. Zhang, S. Jajodia, A. Singhal, and M. Albanese, “Modeling network diversity for evaluating the robustness of networks against zero-day attacks,” in Computer Security-ESORICS 2014. Springer, 2014, pp. 494–511.

    Google Scholar 

  3. O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, “Automated generation and analysis of attack graphs,” in Security and privacy, 2002. Proceedings. 2002 IEEE Symposium on. IEEE, 2002, pp. 273–284.

    Google Scholar 

  4. J. H. Jafarian, E. Al-Shaer, and Q. Duan, “Openflow random host mutation: transparent moving target defense using software defined networking,” in Proceedings of the first workshop on Hot topics in software defined networks. ACM, 2012, pp. 127–132.

    Google Scholar 

  5. E. Al-Shaer and J. H. Jafarian, “On the random route mutation moving target defense,” in National Symposium on Moving Target Research, June 2012.

    Google Scholar 

  6. E. Al-Shaer, “Toward network configuration randomization for moving target defense,” in Moving Target Defense. Springer, 2011, pp. 153–159.

    Google Scholar 

  7. W. Peng, F. Li, C.-T. Huang, and X. Zou, “A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces,” in Communications (ICC), 2014 IEEE International Conference on. IEEE, 2014, pp. 804–809.

    Google Scholar 

  8. R. Colbaugh and K. L. Glass, “Predictive moving target defense.” Sandia National Laboratories (SNL-NM), Albuquerque, NM (United States), Tech. Rep., 2012.

    Google Scholar 

  9. Y. Zhang, M. Li, K. Bai, M. Yu, and W. Zang, “Incentive compatible moving target defense against vm-colocation attacks in clouds,” in Information Security and Privacy Research. Springer, 2012, pp. 388–399.

    Google Scholar 

  10. J. Rowe, K. N. Levitt, T. Demir, and R. Erbacher, “Artificial diversity as maneuvers in a control theoretic moving target defense,” in National Symposium on Moving Target Research, 2012.

    Google Scholar 

  11. M. Crouse, E. W. Fulp, and D. Canas, “Improving the diversity defense of genetic algorithm-based moving target approaches,” in Proceedings of the National Symposium on Moving Target Research, 2012.

    Google Scholar 

  12. J. Hong and D.-S. Kim, “Harms: Hierarchical attack representation models for network security analysis,” 2012.

    Google Scholar 

  13. L. Gallon and J. Bascou, “Using CVSS in attack graphs,” in Proceedings of the 6th International Conference on Availability, Reliability and Security (ARES’11), 2011, pp. 59–66.

    Google Scholar 

  14. G. Georgiadis and L. Kirousis, “Lightweight centrality measures in networks under attack,” Complexus, vol. 3, no. 1, pp. 147–157, 2006.

    CrossRef  Google Scholar 

Download references

Acknowledgements

This work is based on research sponsored by the Office of the Assistant Secretary of Defense for Research and Engineering (OASD(R&E)) under agreement number FAB750-15-2-0120. The US Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of the Office of the Assistant Secretary of Defense for Research and Engineering (OASD(R&E)) or the US Government. This work is also supported in part by an ARO grant W911NF-12-1-0055, National Science Foundation (NSF) Grant HRD-1137466, Department of Homeland Security (DHS) SLA grant 2010-ST-062-0000041 and 2014-ST-062-000059.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and Permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Shetty, S., Yuchi, X., Song, M. (2016). Scalable Network Diversity Modeling For Assessing Threats in Cloud Networks. In: Moving Target Defense for Distributed Systems. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-31032-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31032-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31031-2

  • Online ISBN: 978-3-319-31032-9

  • eBook Packages: Computer ScienceComputer Science (R0)