Abstract
While the large scale distribution and unprecedented connectivity of embedded systems in the Internet of Things (IoT) has enabled various useful application scenarios, it also poses a risk to users and infrastructure alike. Recent incidents, like the Mirai botnet, have shown that these devices are often not sufficiently protected against attacks and can therefore be abused for malicious purposes, like distributed denial of service (DDoS) attacks. While it may be an impossible task to completely secure all systems against attacks, moving target defense (MTD) has been proposed as an alternative to prevent attackers from finding devices and endpoints and eventually launching their attacks against them. One of these approaches is network-based moving target defense which relies on the obfuscation and change of network level information, like IP addresses and ports. Since most of these approaches have been developed with desktop applications in mind, their usefulness in IoT applications has not been investigated.
In this paper we provide a study on the applicability of network-based MTD for low-power devices. We investigate their capabilities to regularly change addresses. We furthermore investigate their performance with multiple assigned IP addresses, for both IPv4 and IPv6. We show that although some functionality of these systems may be impeded by constantly changing addresses, network-based MTD might nonetheless be a viable option to protect Internet-connected embedded systems from attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Aura, T.: Cryptographically Generated Addresses (CGA). RFC 3972 (Proposed Standard), March 2005. http://www.ietf.org/rfc/rfc3972.txt. Updated by RFCs 4581, 4982
Cai, G., Wang, B., Wang, X., Yuan, Y., Li, S.: An introduction to network address shuffling. In: 18th International Conference on Advanced Communication Technology (ICACT), pp. 185–190. IEEE (2016)
Casola, V., De Benedictis, A., Albanese, M.: A moving target defense approach for protecting resource-constrained distributed devices. In: 14th International Conference on Information Reuse and Integration (IRI), pp. 22–29. IEEE (2013)
Christodorescu, M., Fredrikson, M., Jha, S., Giffin, J.: End-to-end software diversification of internet services. In: Jajodia, S., Ghosh, A., Swarup, V., Wang, C., Wang, X. (eds.) Moving Target Defense. Advances in Information Security, vol. 54, pp. 117–130. Springer, New York (2011). https://doi.org/10.1007/978-1-4614-0977-9_7
Droms, R.: Dynamic Host Configuration Protocol. RFC 2131 (Draft Standard), March 1997. http://www.ietf.org/rfc/rfc2131.txt. Updated by RFCs 3396, 4361, 5494, 6842
Dunlop, M., Groat, S., Urbanski, W., Marchany, R., Tront, J.: MT6D: a moving target IPv6 defense. In: 2011 Military Communications Conference (MILCOM 2011), pp. 1321–1326, November 2011
Dunlop, M., Groat, S., Urbanski, W., Marchany, R., Tront, J.: The blind man’s bluff approach to security using IPv6. IEEE Secur. Privacy 10(4), 35–43 (2012)
Gont, F.: A Method for Generating Semantically Opaque Interface Identifiers with IPv6 Stateless Address Autoconfiguration (SLAAC). RFC 7217 (Proposed Standard), April 2014. http://www.ietf.org/rfc/rfc7217.txt
Hinden, R., Deering, S.: IP Version 6 Addressing Architecture. RFC 4291 (Draft Standard), February 2006. http://www.ietf.org/rfc/rfc4291.txt. Updated by RFCs 5952, 6052, 7136, 7346, 7371
Huang, Y., Ghosh, A.K.: Introducing diversity and uncertainty to create moving attack surfaces for web services. In: Jajodia, S., Ghosh, A., Swarup, V., Wang, C., Wang, X. (eds.) Moving Target Defense. Advances in Information Security, vol. 54, pp. 131–151. Springer, New York (2011). https://doi.org/10.1007/978-1-4614-0977-9_8
Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S. (eds.): Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, vol. 54. Springer Science & Business Media, Heidelberg (2011). https://doi.org/10.1007/978-1-4614-0977-9
Judmayer, A., Merzdovnik, G., Ullrich, J., Voyiatzis, A., Weippl, E.: Lightweight address hopping for defending the IPv6 IoT. In: International Conference on Availability, Reliability and Security (ARES) (2017)
Kampanakis, P., Perros, H., Beyene, T.: SDN-based solutions for moving target defense network protection. In: Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1–6, June 2014
Kil, C., Jun, J., Bookholt, C., Xu, J., Ning, P.: Address space layout permutation (ASLP): towards fine-grained randomization of commodity software. In: 2006 22nd Annual Computer Security Applications Conference (ACSAC 2006), pp. 339–348, December 2006
Krylov, V., Kravtsov, K.: IP fast hopping protocol design. In: 10th Central and Eastern European Software Engineering Conference in Russia, CEE-SECR 2014, pp. 11:1–11:5 (2014)
Narten, T., Draves, R., Krishnan, S.: Privacy Extensions for Stateless Address Autoconfiguration in IPv6. RFC 4941 (Draft Standard), September 2007. http://www.ietf.org/rfc/rfc4941.txt
Thomson, S., Narten, T., Jinmei, T.: IPv6 Stateless Address Autoconfiguration. RFC 4862 (Draft Standard), September 2007. http://www.ietf.org/rfc/rfc4862.txt. Updated by RFC 7527
Ullrich, J., Weippl, E.: Privacy is not an option: attacking the IPv6 privacy extension. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 448–468. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26362-5_21
Zhuang, R., DeLoach, S.A., Ou, X.: Towards a theory of moving target defense. In: Proceedings of the First ACM Workshop on Moving Target Defense, pp. 31–40. ACM (2014)
Acknowledgments
This work was supported partly by the Christian Doppler Forschungsgesellschaft (CDG) through Josef Ressel Center (JRC) projects TARGET and u’smile and the Austrian Research Promotion Agency (FFG) through projects SBA-K1, A2Bit, and CyPhySec.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Judmayer, A., Merzdovnik, G., Ullrich, J., Voyiatzis, A.G., Weippl, E. (2018). A Performance Assessment of Network Address Shuffling in IoT Systems. In: Moreno-Díaz, R., Pichler, F., Quesada-Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2017. EUROCAST 2017. Lecture Notes in Computer Science(), vol 10671. Springer, Cham. https://doi.org/10.1007/978-3-319-74718-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-74718-7_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74717-0
Online ISBN: 978-3-319-74718-7
eBook Packages: Computer ScienceComputer Science (R0)