Netinfo Security ›› 2021, Vol. 21 ›› Issue (2): 24-33.doi: 10.3969/j.issn.1671-1122.2021.02.004

Previous Articles     Next Articles

Moving Target Defense Method Based on Double Address Hopping

LI Zhaoyang1,2, TAN Jinglei1(), HU Ruiqin1, ZHANG Hongqi1   

  1. 1. Department of Cryptogram Engineering, Information Engineering University, Zhengzhou 450001, China
    2. Software College, Zhengzhou University, Zhengzhou 450001, China
  • Received:2020-11-02 Online:2021-02-10 Published:2021-02-23
  • Contact: TAN Jinglei E-mail:nxutjl@126.com

Abstract:

The determinism and static nature of the network system make the network defense in a passive state. As a defense concept, moving target defense is proposed, which changes the offensive and defensive situation. Aiming at sniffing and scanning attacks, this paper proposes a moving target defense method based on double address hopping—DAH. Through double virtual address hopping frequency classification, DAH effectively solves the contradiction between communication service quality and hopping frequency. It utilizes low-frequency virtual address hopping to ensure network availability, and utilizes high-frequency virtual address hopping to resist sniffing attacks. By detecting abnormal communication behaviors of the host, DAH constructs spoofed packets to confuse and block scanning attacks. The experimental results show that DAH can not only ensure the normal communication delay and CPU load of the network, but also effectively resist sniffing and scanning attacks.

Key words: moving target defense, software defined network, address hopping, cyber deception

CLC Number: