Netinfo Security ›› 2020, Vol. 20 ›› Issue (7): 42-52.doi: 10.3969/j.issn.1671-1122.2020.07.005

Previous Articles     Next Articles

A Host Fingerprint Anti-detection Model Based on SDN

ZHANG Tao1,2(), LU Bing1,2, LI Ding1,2, HE Kang1,2   

  1. 1. Cyberspace Security Institute, Information Engineering University, Zhengzhou 450001, China
    2. State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China
  • Received:2019-12-15 Online:2020-07-10 Published:2020-08-13
  • Contact: Tao ZHANG E-mail:1019032076@qq.com

Abstract:

Point at the difficulty of host fingerprint detection defense, a host fingerprint anti-detection model based on SDN is proposed. The model constructs virtual nodes that contain fake fingerprint information. By identifying fingerprint probes and constructing response messages according to the fingerprint template, it can deceive fingerprint detection attackers. Then put forward honeypot mapping and traffic traction technology, combined with honeypots, redirect the attack traffic directed to the virtual node to the honeypot, and realize the capture and analysis of aggressive behavior. To analyze the benefits of the model for cybersecurity, a probabilistic model of the proposed model’s defense effectiveness was established. The influence of parameters such as the number of detections, the number of virtual nodes, the number of honeypot mapping rules, the number of allowable losses, the virtual node spoofing rate, and the honeypot detection rate on the probability of attack success is quantified. Finally, the DPDK technology is used to build a prototype system based on the X86 platform. The experimental results show that the proposed model has a higher success rate of deception than the typical anti-recognition tool IPMorph, and the additional performance overhead is less than 5%.

Key words: host fingerprint, reconnaissance, honeypot, cyber deception

CLC Number: