Design and Implementation of Decoy Enhanced Dynamic Virtualization Networks
Technical Report,01 Jul 2015,31 Aug 2016
The College of William and Mary, Office of Sponsored Programs Williamsburg United States
Pagination or Media Count:
Sophisticated adversaries usually initiate their attacks with a reconnaissance phase to discover exploitable vulnerabilities on the targeted networks and systems. This attacking strategy works well due to the static nature of the network topology. To mitigate the effectiveness of reconnaissance attacks, we propose to develop a defensive mechanism that dynamically mutates network topology with a large number of decoys to invalidate the attackers knowledge from network scanning. In this work, we focus on solving two major challenges associated with dynamic network topology, namely, service availability to legitimate users and service security against unauthorized users.
- Computer Programming and Software
- Computer Systems Management and Standards
- Computer Systems