信息网络安全 ›› 2021, Vol. 21 ›› Issue (2): 24-33.doi: 10.3969/j.issn.1671-1122.2021.02.004

• 技术研究 • 上一篇    下一篇

基于双重地址跳变的移动目标防御方法

李朝阳1,2, 谭晶磊1(), 胡瑞钦1, 张红旗1   

  1. 1.信息工程大学密码工程学院,郑州 450001
    2.郑州大学软件学院,郑州 450001
  • 收稿日期:2020-11-02 出版日期:2021-02-10 发布日期:2021-02-23
  • 通讯作者: 谭晶磊 E-mail:nxutjl@126.com
  • 作者简介:李朝阳(1996—),男,河南,硕士研究生,主要研究方向为网络信息安全、移动目标防御|谭晶磊(1994—),男,山东,博士研究生,主要研究方向为网络信息安全、移动目标防御、安全博弈决策|胡瑞钦(1995—),男,湖北,硕士研究生,主要研究方向为网络信息安全、移动目标防御|张红旗(1962—),男,河北,教授,博士,主要研究方向为网络信息安全、移动目标防御、等级保护和信息安全管理
  • 基金资助:
    国家自然科学基金(61902427);国家重点研发计划(2016YFF0204002);国家重点研发计划(2016YFF0204003);郑州市科技领军人才项目(131PLJRC644)

Moving Target Defense Method Based on Double Address Hopping

LI Zhaoyang1,2, TAN Jinglei1(), HU Ruiqin1, ZHANG Hongqi1   

  1. 1. Department of Cryptogram Engineering, Information Engineering University, Zhengzhou 450001, China
    2. Software College, Zhengzhou University, Zhengzhou 450001, China
  • Received:2020-11-02 Online:2021-02-10 Published:2021-02-23
  • Contact: TAN Jinglei E-mail:nxutjl@126.com

摘要:

网络系统的确定性和静态性使得防御处在被动之中,移动目标防御作为一种改变攻守态势的防御理念被提出。针对嗅探和扫描攻击,文章提出一种基于双重地址跳变的移动目标防御方法——DAH。通过双重虚拟地址跳变频率分级,有效解决通信服务质量和跳变频率之间的矛盾,利用低频虚拟地址跳变保证网络可用性,利用高频虚拟地址跳变抵御嗅探攻击。通过检测主机异常通信行为构造欺骗数据包,以实现迷惑并阻断扫描攻击的效果。测试实验表明,DAH既可以保证网络的正常通信时延和CPU负载,又可以有效抵御嗅探和扫描攻击。

关键词: 移动目标防御, 软件定义网络, 地址跳变, 网络欺骗

Abstract:

The determinism and static nature of the network system make the network defense in a passive state. As a defense concept, moving target defense is proposed, which changes the offensive and defensive situation. Aiming at sniffing and scanning attacks, this paper proposes a moving target defense method based on double address hopping—DAH. Through double virtual address hopping frequency classification, DAH effectively solves the contradiction between communication service quality and hopping frequency. It utilizes low-frequency virtual address hopping to ensure network availability, and utilizes high-frequency virtual address hopping to resist sniffing attacks. By detecting abnormal communication behaviors of the host, DAH constructs spoofed packets to confuse and block scanning attacks. The experimental results show that DAH can not only ensure the normal communication delay and CPU load of the network, but also effectively resist sniffing and scanning attacks.

Key words: moving target defense, software defined network, address hopping, cyber deception

中图分类号: