SlideShare ist ein Scribd-Unternehmen logo
1 von 35
PRESENTED BY
SREELEKSHMI S
COLLEGE OF ENGINEERING
CHERTHALA
AN INTRODUCTION TO
NETWORK ADDRESS SHUFFLING
INTRODUCTION
 Nowadays the security of Internet is always facing
severe challenges.
 Moving Target Defense(MTD) has been proposed
as a new revolutionary technology to alter the
asymmetric situation between attacks and
defenses.
 Network Address Shuffling is an important branch
of MTD technology
MOVING TARGET DEFENSE
 One of the major reasons of the severe Internet
security situation is that the network
configurations nowadays are typically
deterministic, static, and homogeneous.
 The attackers typically have asymmetric
advantages and the defenders are always
disadvantaged by being passive.
 To alter the asymmetric situation between attacks
and defenses, Moving Target Defense (MTD) is
proposed as one of the “game-changing” themes
in cyber security.
 MTD can change one or more system attributes
automatically and continually, such that the attack
surface area available to adversaries is
unpredictable.
 Thus can enhance the security of target system to
a certain extent.
CONCEPT OF MTD
MTD
THEORY MECHANISM EVALUATION
How to create an effective
MTD system
Capabilities of MTD
Features of MTD
Designing various
strategies for the
selected attribute(s)
to make it moving
Measuring
effectiveness
of the mechanism
 One way to achieve the goal is automatically
changing one or more system attributes in a
manner continually.
 According to the selected movement
attribute(s),there are three main schools of
thought providing their solutions for designing
MTD mechanisms, and we call them:
(i) Software Transformations
(ii) Dynamic Platform Techniques
(iii) Network Address Shuffling.
 Changing IP address and/or port number is an
effective way to increase the work effort for
attacking. That is the origin of network address
REVIEW TO NETWORK ADDRESS
SHUFFLING
 For the Internet, addresses are a combination of IP and transport
layer information (protocol and port numbers).
 Network address shuffling technique aims to change the IP
address (and port number) of target periodically or erratically.
 The two main fundamental running patterns across existing MTDs
are
(i) Hidden
(ii) Variation
 There are two patterns for the changing of IP address. They are:
(i) Hopping
(ii) Mutation
HIDDEN Vs VARIATION
HOPPING Vs MUTATION
HOPPING
 Synchronization of
communication is strict in time.
 The two sides are fully aware of
the hopping pattern information
of both, or one side is fully aware
of the hopping pattern
information of the other side.
 The synchronization is usually
achieved by time
synchronization scheme, or
exchanging the hopping pattern
information, or pre-setting the
same function and initial value.
MUTATION
 Synchronization of
communication is not strict in
time.
 One side of communication do
not need to know the shuffling
information of the other side of
communication.
 The synchronization is usually
achieved by routing update and
DNS request/respond, or the
other supporting third-party
mechanism.
NETWORK ADDRESS SHUFFLING TECHNIQUES
1.MT6D
 MT6D aims to prevent
attackers from targeting
specific address
through dynamically
rotating the source and
destination
communicating hosts.
 At each time increment, MT6D computes the next IIDs
(Interface IDentifier in an IPv6 address, which can
identify a particular node) for both sender and receiver
of each communicating pair, by using a hash function.
 The two sides of the communication can compute its
own and the other’s next IID, i.e., they are fully aware
of the hopping pattern information of both.
2.OF-RHM (OpenFlow Random Host Mutation)
 OF-RHM is a shuffling
mechanism that should
be deployed in the SDN
network.
 In OF-RHM, each host
is associated with an
unused address range
(the set of virtual IPs) .
A new virtual IP is chosen from the range and
assigned to the host after each mutation interval,
and the new vIP is selected based on uniform
probability.
 The OF-switch can perform the real IP-virtual IP
translation, and thus make that the packets
transmission in the network between the source and
destination gateway are with Vip which increases the
work effort of identifying a particular host.
 However, the OF-RHM can only be used in SDN
network, thus the scalability is low.
3.RHM (Random Host Mutation)
 Its design principles and implementation are similar to
the OF-RHM.
 The main differences from OF-RHM are the vIP
allocation mechanism and the components for
distribution.
 RHM uses a two-phase mutation approach which
consists of LFM (Low Frequency mutation) and HFM
(High Frequency mutation) to assign vIP.
 A LFM interval contains multiple HFM intervals. In
each LFM interval, a random network address range
denoted as VAR (virtual address range) is selected for
each MT (Moving Target) host.
 Then in each HFM interval, a new random Vip within
the VAR assigned during last LFM is chosen for the MT
host, and the selection of the new vIP is based on a
hash function.
4.SPATIO-TEMPORALADDRESS
MUTATION
In this approach,
each host is
associated with a
unique set of IP
address, which
called ephemeral IP
addresses (eIPs,
which is similar to
the vIP in OF-RHM
and RHM) to reach
other hosts.
5.MOTAG
MOTAG is proposed to help
online application server
against network flooding
attacks.
 It requires a group of proxy
nodes to be deployed
around the server node, and
allocates an active working
proxy for each certification
user to forward data traffic
between the user and the
It can protect the online server strongly since the
address of the server is privacy for any user,
even each client is only aware of its own working
proxy’s IP address.
When a working proxy is under attack, it would
startup a process called client-to-proxy shuffling.
In other words, the client is passive to accept the
address shuffling of its working ISBNproxy, and
knows nothing about the address of server.
MOTAG can gradually concentrate the attacker
to a particular proxy to minimize the impact of an
attack.
However, it must work together with the attack
6.DYNAT
 DYNAT is proposed to defend any adversary
sniffing the network.
 Before the packet was routed, the host identity
information that can uniquely describe a
connection between two hosts, host portion of
destination’s IP address, and TCP/UDP port
number, were translated by a cryptographic
algorithm.
7.NETWORK ADDRESS HOPPING
 Network Address Hopping is proposed to
enhance the security of data by transferring them
across multiple data connections named
channels.
 The hopping pattern, in which include the hopping
sequence is defined by each endpoint
respectively and sent to the other endpoint, thus
the two sides are fully aware of the hopping
pattern information.
8.NASR
NASR is proposed to against hitlist worms.
 In this approach, the two communicating
hosts are not aware of the other’s next
address until sending a DNS request and
getting a reply.
9.SDNA
 When a DNS response comes to the guest, the
SDNA Entity would replace the real IP with Token IP
which is generated by the SDNA Entity.
 When the guest initiates a connection to a Token IP,
the SDNA Entity would rewrite the packets by
replacing the Token IP with the real IP.
 In other words, one side of a communication does
not know the other’s real address, and the Token IP
is obtained from the other’s SDNA Entity when it
requests a DNS resolution.
10.SDN SHUFFLE APPROACH
The SDN shuffle approach uses synthetic
addressing information to replace the real
addressing information for defending
reconnaissance.
NETWORK ADDRESS SHUFFLING TECHNIQUES
COMPARISON MATRICS
The four comparison metrics are:
1) Transparency: Transparency means that a real
thing seems not to be existing, in other words,
users have no perception on it.
2) Complexity: The Complexity indicates the degree
of simplicity for deploying a network address
shuffling technique.
3) Cost: The Cost includes the deployment cost and
the transmission cost.
4) Scalability: Scalability includes two meanings, one
is whether the mechanism can be deployed on
various network, such as current IPv4 network, IPv6
network, or other type network. And the other is
whether the mechanism can work together with other
security mechanisms, such as IDS and Firewall, to
enhance the performance against attacks.
COMPARISON OF DIFFERENT NETWORK
ADDRESS SHUFFLING TECHNIQUES
ISSUES OF IMPLEMENTATION
 The key issues for implementing an effective and practical
network address shuffling technique are:
1. The unpredictability of shuffling:
 Unpredictability is a key characteristic of the MTD technology.
 Make it hard for the attacker to predict the precise information
of the target in next period, and thus increase the work effort
of attack, decrease the probability of successful attacks and
increase the target’s resiliency.
 In the network address shuffling technology, there is usually a
large configuration space to be used, thus the critical problem is
the way of randomization to achieve unpredictability.
2. The determination of the shuffling frequency:
 For the defender, the speediness is influenced by the
shuffling frequency.
 If the shuffling frequency is too low, while the attacker
is fast enough, there is most likely a successful attack,
i.e., it can’t effectively reduce the success rate of
attacks.
 If the shuffling frequency is too high, although it can
provide a high degree of security, it would reduce the
system performance and availability of the services.
 Therefore, determining the optimal shuffling
3. The security of the rules of shuffling :
 The shuffling has to be controlled and managed by the
administrator to provide active defense while ensuring
the continuity of mission and the functionality of
system.
 In the mutation pattern, the security of the DNS
resolution information would influence the security of
the mechanism.
 In the hopping pattern, the security of the hopping
information transmission would affect the security
provided by the mechanism greatly.
PRACTICABILITY
 Being practical is the basis for a technique to be widely
applied.
 There are two problems that need to be addressed for
practicability:
1. Transparency to the user: Which means that the
deployment of the network address shuffling mechanism
must not change or influence the normal user operation
greatly. Also, the performance loss induced by the
deployment must be acceptable to the user.
2. Acceptable deployment cost and complexity: If the
CONCLUSION
 Introduced the concept of MTD as a solution for cyber
attacks.
 The fundamental running patterns were identified and
described, which consist of two main patterns called
hidden and variation.
 Identified and described two patterns of the network
address shuffling techniques, hopping and mutation, and
then categorized the main existed network address
shuffling techniques according to the two patterns.
 Under each category, we gave a detailed description on
each mechanism and compared their features.
 Discussed some key issues on implementing an effective
REFERENCES
[1] Guilin Cai, Baosheng Wang, Xiaofeng Wang, Yulei
Yuan, Sudan Li College of Computer, National University
of Defense Technology, Changsha, China,”An
Introduction to Network Address Shuffling”.
[2] T. E. Carroll, M. Crouse, E. W. Fulp and K. S.
Berenhaut, "Analysis of network address shuffling as a
moving target defense", in Proc of 2014 IEEE
International Conference on Communications (ICC),
2014, pp.701-706.
[3]Y. Liu, W. Peng and J. Su, "A study of IP prefix hijacking
in cloud computing networks", SECURITY AND
COMMUNICATION NETWORKS, vol.7, no.11, pp.2201-
2210. 2014.
[4] D. Evans, A. Nguyen-Tuong, and J. Knight,
“Effectiveness of moving target defenses,” in Moving
Target Defense: Creating Asymmetric Uncertainty for
Cyber Threats, S. Jajodia, A. K. Ghosh, V. Swarup, C.
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING

Weitere ähnliche Inhalte

Was ist angesagt?

A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERJournal For Research
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Networkijsrd.com
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesPriyangaRajaram
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSAnkur Singhal
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolMehedi
 
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMSTRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMSIJNSA Journal
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackMehedi
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selectiveveenasraj
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leachcsandit
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolZac Darcy
 
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSExclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSIRJET Journal
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBirju Tank
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
 

Was ist angesagt? (20)

A43030104
A43030104A43030104
A43030104
 
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKERA STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
A STATISTICAL APPROACH TO DETECT DENIAL OF SERVICE ATTACKER
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc NetworkReview of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
Review of Flooding Attack Detection in AODV Protocol for Mobile Ad-hoc Network
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETS
 
B43040610
B43040610B43040610
B43040610
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Study and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocolStudy and analysis vurnerability of aodv protocol
Study and analysis vurnerability of aodv protocol
 
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMSTRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS
 
Performance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attackPerformance analysis of aodv protocol on blackhole attack
Performance analysis of aodv protocol on blackhole attack
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
 
Ab26180184
Ab26180184Ab26180184
Ab26180184
 
Simulation of snooze attack in leach
Simulation of snooze attack in leachSimulation of snooze attack in leach
Simulation of snooze attack in leach
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocol
 
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSExclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETS
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...
 

Andere mochten auch

Lekts presentation6
Lekts presentation6Lekts presentation6
Lekts presentation6ganzorigb
 
өгөгдөл дамжуулах
өгөгдөл дамжуулахөгөгдөл дамжуулах
өгөгдөл дамжуулахOidov Umbelee
 
Lekts presentation8
Lekts presentation8Lekts presentation8
Lekts presentation8ganzorigb
 
өгөгдөл дамжуулах лекц
өгөгдөл дамжуулах лекцөгөгдөл дамжуулах лекц
өгөгдөл дамжуулах лекцOidov Umbelee
 
өгөгдөл дамжуулах 4
өгөгдөл дамжуулах 4өгөгдөл дамжуулах 4
өгөгдөл дамжуулах 4Oidov Umbelee
 

Andere mochten auch (10)

Lekts presentation6
Lekts presentation6Lekts presentation6
Lekts presentation6
 
өгөгдөл дамжуулах
өгөгдөл дамжуулахөгөгдөл дамжуулах
өгөгдөл дамжуулах
 
Lekts presentation8
Lekts presentation8Lekts presentation8
Lekts presentation8
 
өгөгдөл дамжуулах лекц
өгөгдөл дамжуулах лекцөгөгдөл дамжуулах лекц
өгөгдөл дамжуулах лекц
 
IP hicheel 1
IP hicheel 1IP hicheel 1
IP hicheel 1
 
өгөгдөл дамжуулах 4
өгөгдөл дамжуулах 4өгөгдөл дамжуулах 4
өгөгдөл дамжуулах 4
 
It101 lecture-8
It101 lecture-8It101 lecture-8
It101 lecture-8
 
It101-5
It101-5It101-5
It101-5
 
It101 lec6
It101 lec6It101 lec6
It101 lec6
 
It101 lec7
It101 lec7It101 lec7
It101 lec7
 

Ähnlich wie AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING

Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobileIJCNCJournal
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANEditor IJCATR
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 
Lte and future frauds
Lte and future fraudsLte and future frauds
Lte and future fraudsRanjeet Kumar
 
A Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkA Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkIRJET Journal
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Mumbai Academisc
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct doxBaig Mirza
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.RAVI RAJ
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full reportdeepakmarndi
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A ReviewIRJET Journal
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKScscpconf
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 

Ähnlich wie AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING (20)

Secure routing and data transmission in mobile
Secure routing and data transmission in mobileSecure routing and data transmission in mobile
Secure routing and data transmission in mobile
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
Lte and future frauds
Lte and future fraudsLte and future frauds
Lte and future frauds
 
A Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkA Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc Network
 
Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...Detection of application layer ddos attack using hidden semi markov model (20...
Detection of application layer ddos attack using hidden semi markov model (20...
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 
Arun prjct dox
Arun prjct doxArun prjct dox
Arun prjct dox
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
IRJET- Secure Data Transmission from Malicious Attacks: A Review
IRJET-  	  Secure Data Transmission from Malicious Attacks: A ReviewIRJET-  	  Secure Data Transmission from Malicious Attacks: A Review
IRJET- Secure Data Transmission from Malicious Attacks: A Review
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
 
NAT
NATNAT
NAT
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 

Kürzlich hochgeladen

welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptxNikhil Raut
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 

Kürzlich hochgeladen (20)

welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptx
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 

AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING

  • 1. PRESENTED BY SREELEKSHMI S COLLEGE OF ENGINEERING CHERTHALA AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
  • 2. INTRODUCTION  Nowadays the security of Internet is always facing severe challenges.  Moving Target Defense(MTD) has been proposed as a new revolutionary technology to alter the asymmetric situation between attacks and defenses.  Network Address Shuffling is an important branch of MTD technology
  • 3. MOVING TARGET DEFENSE  One of the major reasons of the severe Internet security situation is that the network configurations nowadays are typically deterministic, static, and homogeneous.  The attackers typically have asymmetric advantages and the defenders are always disadvantaged by being passive.  To alter the asymmetric situation between attacks and defenses, Moving Target Defense (MTD) is proposed as one of the “game-changing” themes in cyber security.
  • 4.  MTD can change one or more system attributes automatically and continually, such that the attack surface area available to adversaries is unpredictable.  Thus can enhance the security of target system to a certain extent.
  • 5. CONCEPT OF MTD MTD THEORY MECHANISM EVALUATION How to create an effective MTD system Capabilities of MTD Features of MTD Designing various strategies for the selected attribute(s) to make it moving Measuring effectiveness of the mechanism
  • 6.  One way to achieve the goal is automatically changing one or more system attributes in a manner continually.  According to the selected movement attribute(s),there are three main schools of thought providing their solutions for designing MTD mechanisms, and we call them: (i) Software Transformations (ii) Dynamic Platform Techniques (iii) Network Address Shuffling.  Changing IP address and/or port number is an effective way to increase the work effort for attacking. That is the origin of network address
  • 7. REVIEW TO NETWORK ADDRESS SHUFFLING  For the Internet, addresses are a combination of IP and transport layer information (protocol and port numbers).  Network address shuffling technique aims to change the IP address (and port number) of target periodically or erratically.  The two main fundamental running patterns across existing MTDs are (i) Hidden (ii) Variation  There are two patterns for the changing of IP address. They are: (i) Hopping (ii) Mutation
  • 9. HOPPING Vs MUTATION HOPPING  Synchronization of communication is strict in time.  The two sides are fully aware of the hopping pattern information of both, or one side is fully aware of the hopping pattern information of the other side.  The synchronization is usually achieved by time synchronization scheme, or exchanging the hopping pattern information, or pre-setting the same function and initial value. MUTATION  Synchronization of communication is not strict in time.  One side of communication do not need to know the shuffling information of the other side of communication.  The synchronization is usually achieved by routing update and DNS request/respond, or the other supporting third-party mechanism.
  • 11. 1.MT6D  MT6D aims to prevent attackers from targeting specific address through dynamically rotating the source and destination communicating hosts.
  • 12.  At each time increment, MT6D computes the next IIDs (Interface IDentifier in an IPv6 address, which can identify a particular node) for both sender and receiver of each communicating pair, by using a hash function.  The two sides of the communication can compute its own and the other’s next IID, i.e., they are fully aware of the hopping pattern information of both.
  • 13. 2.OF-RHM (OpenFlow Random Host Mutation)  OF-RHM is a shuffling mechanism that should be deployed in the SDN network.  In OF-RHM, each host is associated with an unused address range (the set of virtual IPs) .
  • 14. A new virtual IP is chosen from the range and assigned to the host after each mutation interval, and the new vIP is selected based on uniform probability.  The OF-switch can perform the real IP-virtual IP translation, and thus make that the packets transmission in the network between the source and destination gateway are with Vip which increases the work effort of identifying a particular host.  However, the OF-RHM can only be used in SDN network, thus the scalability is low.
  • 15. 3.RHM (Random Host Mutation)  Its design principles and implementation are similar to the OF-RHM.  The main differences from OF-RHM are the vIP allocation mechanism and the components for distribution.  RHM uses a two-phase mutation approach which consists of LFM (Low Frequency mutation) and HFM (High Frequency mutation) to assign vIP.
  • 16.  A LFM interval contains multiple HFM intervals. In each LFM interval, a random network address range denoted as VAR (virtual address range) is selected for each MT (Moving Target) host.  Then in each HFM interval, a new random Vip within the VAR assigned during last LFM is chosen for the MT host, and the selection of the new vIP is based on a hash function.
  • 17. 4.SPATIO-TEMPORALADDRESS MUTATION In this approach, each host is associated with a unique set of IP address, which called ephemeral IP addresses (eIPs, which is similar to the vIP in OF-RHM and RHM) to reach other hosts.
  • 18. 5.MOTAG MOTAG is proposed to help online application server against network flooding attacks.  It requires a group of proxy nodes to be deployed around the server node, and allocates an active working proxy for each certification user to forward data traffic between the user and the
  • 19. It can protect the online server strongly since the address of the server is privacy for any user, even each client is only aware of its own working proxy’s IP address. When a working proxy is under attack, it would startup a process called client-to-proxy shuffling. In other words, the client is passive to accept the address shuffling of its working ISBNproxy, and knows nothing about the address of server. MOTAG can gradually concentrate the attacker to a particular proxy to minimize the impact of an attack. However, it must work together with the attack
  • 20. 6.DYNAT  DYNAT is proposed to defend any adversary sniffing the network.  Before the packet was routed, the host identity information that can uniquely describe a connection between two hosts, host portion of destination’s IP address, and TCP/UDP port number, were translated by a cryptographic algorithm.
  • 21. 7.NETWORK ADDRESS HOPPING  Network Address Hopping is proposed to enhance the security of data by transferring them across multiple data connections named channels.  The hopping pattern, in which include the hopping sequence is defined by each endpoint respectively and sent to the other endpoint, thus the two sides are fully aware of the hopping pattern information.
  • 22. 8.NASR NASR is proposed to against hitlist worms.  In this approach, the two communicating hosts are not aware of the other’s next address until sending a DNS request and getting a reply.
  • 23. 9.SDNA  When a DNS response comes to the guest, the SDNA Entity would replace the real IP with Token IP which is generated by the SDNA Entity.  When the guest initiates a connection to a Token IP, the SDNA Entity would rewrite the packets by replacing the Token IP with the real IP.  In other words, one side of a communication does not know the other’s real address, and the Token IP is obtained from the other’s SDNA Entity when it requests a DNS resolution.
  • 24. 10.SDN SHUFFLE APPROACH The SDN shuffle approach uses synthetic addressing information to replace the real addressing information for defending reconnaissance.
  • 26. COMPARISON MATRICS The four comparison metrics are: 1) Transparency: Transparency means that a real thing seems not to be existing, in other words, users have no perception on it. 2) Complexity: The Complexity indicates the degree of simplicity for deploying a network address shuffling technique.
  • 27. 3) Cost: The Cost includes the deployment cost and the transmission cost. 4) Scalability: Scalability includes two meanings, one is whether the mechanism can be deployed on various network, such as current IPv4 network, IPv6 network, or other type network. And the other is whether the mechanism can work together with other security mechanisms, such as IDS and Firewall, to enhance the performance against attacks.
  • 28. COMPARISON OF DIFFERENT NETWORK ADDRESS SHUFFLING TECHNIQUES
  • 29. ISSUES OF IMPLEMENTATION  The key issues for implementing an effective and practical network address shuffling technique are: 1. The unpredictability of shuffling:  Unpredictability is a key characteristic of the MTD technology.  Make it hard for the attacker to predict the precise information of the target in next period, and thus increase the work effort of attack, decrease the probability of successful attacks and increase the target’s resiliency.  In the network address shuffling technology, there is usually a large configuration space to be used, thus the critical problem is the way of randomization to achieve unpredictability.
  • 30. 2. The determination of the shuffling frequency:  For the defender, the speediness is influenced by the shuffling frequency.  If the shuffling frequency is too low, while the attacker is fast enough, there is most likely a successful attack, i.e., it can’t effectively reduce the success rate of attacks.  If the shuffling frequency is too high, although it can provide a high degree of security, it would reduce the system performance and availability of the services.  Therefore, determining the optimal shuffling
  • 31. 3. The security of the rules of shuffling :  The shuffling has to be controlled and managed by the administrator to provide active defense while ensuring the continuity of mission and the functionality of system.  In the mutation pattern, the security of the DNS resolution information would influence the security of the mechanism.  In the hopping pattern, the security of the hopping information transmission would affect the security provided by the mechanism greatly.
  • 32. PRACTICABILITY  Being practical is the basis for a technique to be widely applied.  There are two problems that need to be addressed for practicability: 1. Transparency to the user: Which means that the deployment of the network address shuffling mechanism must not change or influence the normal user operation greatly. Also, the performance loss induced by the deployment must be acceptable to the user. 2. Acceptable deployment cost and complexity: If the
  • 33. CONCLUSION  Introduced the concept of MTD as a solution for cyber attacks.  The fundamental running patterns were identified and described, which consist of two main patterns called hidden and variation.  Identified and described two patterns of the network address shuffling techniques, hopping and mutation, and then categorized the main existed network address shuffling techniques according to the two patterns.  Under each category, we gave a detailed description on each mechanism and compared their features.  Discussed some key issues on implementing an effective
  • 34. REFERENCES [1] Guilin Cai, Baosheng Wang, Xiaofeng Wang, Yulei Yuan, Sudan Li College of Computer, National University of Defense Technology, Changsha, China,”An Introduction to Network Address Shuffling”. [2] T. E. Carroll, M. Crouse, E. W. Fulp and K. S. Berenhaut, "Analysis of network address shuffling as a moving target defense", in Proc of 2014 IEEE International Conference on Communications (ICC), 2014, pp.701-706. [3]Y. Liu, W. Peng and J. Su, "A study of IP prefix hijacking in cloud computing networks", SECURITY AND COMMUNICATION NETWORKS, vol.7, no.11, pp.2201- 2210. 2014. [4] D. Evans, A. Nguyen-Tuong, and J. Knight, “Effectiveness of moving target defenses,” in Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, S. Jajodia, A. K. Ghosh, V. Swarup, C.