A Survey on Moving Target Defense: Intelligently Affordable, Optimized and Self-Adaptive
Abstract
:1. Introduction
1.1. Motive
- The current state of intelligent MTD has not yet achieved a unified and comprehensive system. For instance, when classifying existing intelligent MTD techniques by applying them into five layers (network layer, platform layer, runtime environment layer, software layer, and data layer), it was observed that most of these techniques were primarily focused on the network layer, with little attention paid to other layers. This lack of attention to multi-layer protection was inconsistent with the continued development of a defense system for more than ten years.
- Diverse intelligent MTD techniques require a systematic organization to facilitate researchers’ comprehension of the evolution and trends of intelligent MTD. Such an organization is expected to contribute significantly to the development of intelligent MTD. Specifically, after organizing these techniques, researchers can gain insights into one of the emerging trends toward self-adaptive as intelligent MTD is organized. They can comprehend that this trend frequently employs machine learning (ML) algorithms that are deformed by reinforcement learning (RL). We believe such a systematic organization provides an opportunity for researchers to advance their research alongside the development of related MTD techniques.
1.2. Survey Methodology
- Papers in (i) were put forward because their defense methods showed better effectiveness than corresponding traditional defense or their defense methods could be improved into intelligent MTD techniques and be compared with the latter ones.
- Papers in (ii) were put forward because their defense methods could achieve more significance than previous ones. We collected these papers and summarized three categories of them, towards affordable, towards optimized, and towards self-adapting, respectively. Or we could also regard them as development trends of intelligent MTD based on their commonalities. We analyzed what these papers had achieved and what they had not accomplished to approximately represent the status quo of the entire category.
- Papers in (iii) demonstrated different categories of MTD techniques, and we classified them into various levels, which helped us to comprehend the development of MTD in a more comprehensive way.
1.3. Comparison with Existing MTD Surveys
1.4. Key Contributions
- We conducted a thorough survey on MTD, as shown in Figure 3. We analyzed the development and deficiencies of MTD techniques, highlighting the emergence of reinforced MTD techniques such as intelligent MTD and SDN-based MTD. Then, we focused on techniques related to intelligent MTD, categorizing them based on their characteristics towards affordable, optimized, and self-adaptive, and formed a systematic organization, aiming to provide researchers with a more intuitive understanding of current intelligent MTD techniques.
- During our research, we introduced a new classification method for MTD techniques, SDR/Five layers, which aligns more closely with existing MTD development. This approach has practical significance and offers a more detailed classification for all the MTD techniques proposed so far.
- We discussed the practical conclusions that could be obtained from our survey and identify existing limitations. From these insights, we offer suggestions for future developments in intelligent MTD techniques.
2. MTD Techniques
2.1. Background
- Traditional defenses aim to enhance the defense capabilities of static facilities and minimize their vulnerabilities’ exposure. In contrast, MTD concentrates on dynamically shifting the attack surface [3] to increase resilience.
- Traditional defenses often focus on monitoring, detecting, preventing, and remediating attacks on static infrastructure. MTD emphasizes faster and more comprehensive attack detection and timely responses to mitigate potential damages.
- Traditional defenses rely on known attack patterns for defense and may be limited in addressing emerging or novel threats. MTD seeks to proactively address such unpredictable attacks through its dynamic nature.
- Unlike traditional defense mechanisms, which operate in a fixed dimension, MTD adapts and changes constantly to protect against attacks on ever-changing systems. This approach significantly limits attackers’ research time and ability to penetrate compromised systems.
- Minimizing defense costs (e.g., system deployment overhead)
- Maximizing service availability for users
- Maintaining the required defense security levels
2.2. Design and Classification
2.2.1. What to Move
2.2.2. How to Move
- Shuffling
- Diversity
- Redundancy
- Hybrid
2.2.3. When to Move
- Fixed-time triggering: MTD techniques periodically shift the attack surface at fixed intervals. Setting the triggering interval requires a technique-specific analysis, but for each technique, researchers need to find the right triggering point. If the interval is too long, attackers have enough time to penetrate the system and launch an attack. If it is too short, the MTD mechanism is triggered frequently, leading to wasted resources and degraded performance. Additionally, frequent triggering of MTD can significantly degrade the QoS and users’ experience.
- Ad hoc event triggering: MTD shifts the attack surface when the system detects an attacker’s access or a precursor to an attack. Self-adaptive MTD adopts this approach, and its main challenge is accurately predicting attacks that can trigger MTD effectively.
2.3. Discussion
2.3.1. Systematic Development
2.3.2. Integration with Existing Security Defense Mechanisms
2.3.3. Combination with New Techniques
- SDN-based MTD
- MTD-applied cloud computing
2.3.4. Challenges for Existing MTD Techniques
- Large resource consumption and high defense costs (we have highlighted this issue several times during the introduction of SDR).
- For example, in the face of the attacker’s scanning, the existing MTD’s countermeasure is to perform IP hopping when scanning behavior is detected, and their representative techniques include but are not limited to OF-RHM [11], SEHT [12], DDS [13], and NATD [14]. Their common problem is a lack of accuracy and efficiency in identifying attack manners, the waste of resources caused by untargeted hops, and a lack of integration with the affordable defense pursued by MTD.
- They have an incapability of balancing multi-constraints (e.g., costs, security performance, and service availability).
- For instance, routing randomization has been proven to be an effective method against eavesdropping attacks. Currently, representative routing randomization techniques include but are not limited to: RRM [53], AE-RRM [50], AT-RRM [54], and SSO-RM [55]. However, RRM and AE-RRM implement random transformations only on the routes of data transmission between nodes, without considering different attack behaviors and protecting network QoS under such circumstances. As for AT-RRM and SSO-RM, they can dynamically adjust transformation strategies to some extent, but their protection effectiveness for QoS is still unsatisfactory, and they fail to consider the varying demands of different applications for latency and bandwidth. Besides, all of their packets’ granularity is too coarse, making it easy for attackers to intercept continuous data packets and render the defense ineffective.
- Relatively fixed defense strategies (easy to be reconnoitered and recognized by attackers).
3. Intelligent MTD Techniques
3.1. Background
3.2. Intelligent MTD Techniques
3.2.1. Towards Affordable
- New MTD methods are designed to reduce the high overhead of existing methods
- Methods are designed to minimize the additional overhead when triggering MTD
3.2.2. Towards Optimized
- To clarify the attackers’ and defenders’ knowledge about each other and to build a game model (such as the Stackelberg game based on incomplete information and a zero-sum game or a general-sum game according to the actual situation);
- To consider different reinforcement learning practical scenarios that can be applied to advance the game process and reach game equilibrium finally, e.g., Bayesian-Stackelberg equilibrium;
- To select the most efficient sets of strategies and consider them as optimized strategies for the MTD system (as shown in Figure 5).
- Defensive strategy solutions considering specific types of attacks
- Defensive strategy solutions considering generalized types of attacks
3.2.3. Towards Self-Adaptive
- Self-adaptation empowered by machine learning
- Self-adaptation empowered by machine learning with legacy defense mechanisms
- Self-adaptation empowered by machine learning with game theories
3.3. Discussion
- When introducing machine learning to address existing MTD problems, it is important to ensure the two fit together seamlessly. Achieving optimal results requires a rigorous validation process. Machine learning often requires large amounts of data for training, which can introduce additional overhead and complexity. In addition, many machine learning algorithms rely on high-performance GPU computing cards and occupy significant storage space. In addition, inefficient machine learning algorithms can also pose processing efficiency issues, so sufficient computing power must be provided in the environment where MTD is deployed.
- In addition, existing intelligent MTD research has focused on optimized solutions that specify attack defense types, and these have shown promising results in real-world cyber-attack and defense scenarios. However, they are only applicable to specific scenarios and may be limited in practical situations where attack defense types change rapidly. In contrast, generalized attack types can model the real world more closely and take more factors into account. However, when information about rational adversaries is incomplete, these models may yield sub-optimal strategies in sequential settings. Furthermore, existing efforts to learn defense policies in sequential settings are either unpopular or neglect the strategic nature of the adversary due to scalability issues caused by incomplete information.
- At last, self-adaptive MTD solves various problems caused by manual decision-making regarding MTD trigger intervals and balances security and resource costs. It can also extract features for optimal defense strategy selection in the face of new attack methods. However, the design of the engine for sensing attack behavior and analyzing attack features is complicated. The continuous collection of data samples is required to sense attacks, and the adaptive effect heavily depends on the algorithm and sensing engine.
4. Conclusions
4.1. Empirical Insights
- MTD aims to enhance security by shifting the attack surface rather than eliminating all vulnerabilities in system components. This represents a departure from traditional security goals, which have focused on eliminating vulnerabilities entirely. With the addition of machine learning, MTD can provide an affordable, optimized, and self-adaptive defense mechanism that enhances system security without requiring the replacement of existing techniques. By actively guiding this development trend, we can further balance the relationship between defense costs, system security, and system availability in multiple dimensions, enabling MTD to move toward large-scale applications.
- Defense measures are not mutually exclusive, and MTD is actively seeking to integrate with existing security defense mechanisms. However, it is crucial to consider how introducing MTD may alter the existing network configuration, which is often relatively fixed when existing network security defense measures are in place. This change can increase resource consumption, reduce network availability, and potentially interfere with existing network security defenses, ultimately reducing overall defense capability.
- To leverage existing techniques and maximize the effectiveness and efficiency of MTD, it is significant to combine MTD with other emerging techniques such as SDN, cloud computing, and machine learning to achieve better active defense. By using different types of MTD that can be tailored to specific application domains, we can enhance the overall defense capability of MTD.
- While game-theoretic MTD approaches are commonly utilized in MTD strategy selection research, the emergence of machine learning has shown that relevant algorithms can be considered to address the affordability, self-adaptation, and other limitations of existing MTD techniques [82]. Machine learning can also help construct better protection mechanisms for existing MTD systems.
- In our survey, we did not present MTD techniques measurement metrics due to our focus on MTD and intelligent development, but this does not mean that measurement metrics are unimportant. Many MTD techniques have applied MTD-related metrics to assess the effectiveness of their own techniques. Unfortunately, these evaluation metrics differ among different MTDs, making it difficult to integrate various techniques effectively. Several quantitative metrics have been proposed to assist in uniformly assessing MTD techniques, but they have only had limited success. We believe that researchers should continue striving to develop a universal metric that covers all aspects of cyber-attacks and defense to facilitate the convergence of MTD techniques as much as possible.
4.2. Future Research
- We propose the establishment of a more comprehensive coverage of MTD classifications in future work. In our survey, we introduced the SDR/Five layers MTD classification by what to move and how to move, but we did not combine it with when to move to cover more comprehensive MTD techniques. It is necessary to develop a classification that can comprehensively include multidimensional MTD attributes to help researchers better understand and develop MTD techniques.
- Security, performability, and affordability are important indicators when measuring the effectiveness of MTD techniques. While MTD improves system security, it may also hinder service availability to average users. In future research, we suggest exploring finer granularity to develop affordable MTD solutions that meet the average users’ needs. Notably, most existing MTD approaches do not provide highly lightweight distributed solutions. Therefore, we recommend building more lightweight MTD techniques in the future to enable the higher widespread deployment and application of MTDs.
- Comprehending the attacker’s behavior or system security situation is crucial in enabling defenders to make optimal decisions. However, there are many factors to consider for practical application, and extrapolation can easily lead to sub-optimal strategies. To address this, MTD should explore a wider range of practical scenarios with reinforcement learning to help defenders solve more difficult adversaries.
- We believe that the concepts and techniques of self-adaptive MTD are not yet mature, and therefore, more self-adaptive MTD mechanisms need to be developed. In terms of triggering MTD operations, we need to balance the bi-directional costs of triggering and security by considering factors such as system vulnerability or attack pattern/strength. This requires advanced detection or learning capabilities from defenders.
- The advancement of intelligent MTD techniques cannot be achieved without the support of big data and high-performance hardware. Therefore, future intelligent MTD researchers should consider constructing larger sample datasets and forming systematic sample databases for training machine learning algorithms and improving accuracy and generalization ability. Using hardware devices with higher computing performance can also enhance training efficiency and the real-time decision-making of MTD.
- Deceptive defense [83] ideas have emerged in recent years, and combining deceptive defense methods with MTD could be a future research trend. There is already a trend of combining deceptive defense with intelligence [81], where deceptive defense provides misleading information by actively exposing false intelligence of the protected system, thus allowing the attacker to move the attack in the direction of favoring the defender by actively creating and reinforcing the observation and identification of deceptive information.
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Bland, J.A.; Petty, M.D.; Whitaker, T.S.; Maxwell, K.P.; Cantrell, W.A. Machine learning cyberattack and defense strategies. Comput. Secur. 2020, 92, 101738. [Google Scholar] [CrossRef]
- Wee, B.V.; Banister, D. How to Write a Literature Review Paper? Transport. Rev. 2016, 36, 278–288. [Google Scholar] [CrossRef]
- Okhravi, H.; Rabe, M.; Leonard, W.; Hobson, T.; Bigelow; Streilein, W. Survey of Cyber Moving Targets; Technical Report, 1166; MIT Lincoln Laboratory: Lexington, MA, USA, 2013. [Google Scholar]
- Ward, B.; Gomez, S.; Skowyra, R.; Bigelow, D.; Martin, J.; Okhravi, H. Survey of Cyber Moving Targets, 2nd ed.; Technical Report, 1228; MIT Lincoln Laboratory: Lexington, MA, USA, 2018. [Google Scholar]
- Cai, G.L.; Wang, B.S.; Hu, W.; Wang, T.Z. Moving target defense: State of the art and characteristics. Front. Inf. Technol. Electron. Eng. 2016, 17, 1122–1153. [Google Scholar] [CrossRef]
- Lei, C.; Zhang, H.-Q.; Tan, J.-L.; Zhang, Y.-C.; Liu, X.-H. Moving target defense techniques: A survey. Secur. Commun. Netw. 2018, 3759626. [Google Scholar] [CrossRef]
- Zheng, J.; Namin, A.S. A survey on the moving target defense strategies: An architectural perspective. J. Comput. Sci. Technol. 2019, 34, 207–233. [Google Scholar] [CrossRef]
- Sengupta, S.; Chowdhary, A.; Sabur, A.; Huang, D.; Alshamrani, A.; Kambhampati, S. A survey of moving target defenses for network security. arXiv 2019, arXiv:1905.00964. [Google Scholar] [CrossRef]
- Cho, J.-H.; Yoon, S.; Kim, D.S. Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. IEEE Commun. Surv. Tutor. 2020, 22, 709–745. [Google Scholar] [CrossRef]
- Sun, Y.; Ji, W.; Weng, J.; Zhao, B. Overview on MTD based on game theory. MATEC Web Conf. 2020, 309, 02012. [Google Scholar] [CrossRef]
- Jafarian, J.H.; Al-Shaer, E.; Duan, Q. Openflow Random Host Mutation: Transparent Moving Target Defense Using Software Defined Networking. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks, New York, NY, USA, 13 August 2012; pp. 127–132. [Google Scholar]
- Lei, C.; Zhang, H.; Ma, D.; Yang, Y. Network Moving Target Defense Technique Based on Self-Adaptive End-Point Hopping. Arab. J. Sci. Eng. 2017, 42, 3249–3262. [Google Scholar] [CrossRef]
- Miao, L.; Hu, H.; Cheng, G. The Design and Implementation of a Dynamic IP Defense System Accelerated by Vector Packet Processing. In Proceedings of the International Conference on Industrial Control Network and System Engineering Research, New York, NY, USA, 15–16 March 2019; pp. 64–69. [Google Scholar]
- Smith, R.J.; Zincir-Heywood, A.N.; Heywood, M.I.; Jacobs, J.T. Initiating a Moving Target Cyber Defense with a Real-Time Neuro-Evolutionary Detector. In Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, New York, NY, USA, 20–24 July 2016; pp. 1095–1102. [Google Scholar]
- Al-Shaer, E.; Duan, Q.; Jafarian, J.H. Random host mutation for moving target defense. In Security and Privacy in Communication Networks, 8th International ICST Conference, SecureComm 2012, Padua, Italy, 3–5 September 2012; Springer: Berlin/Heidelberg, Germany, 2012; Volume 106. [Google Scholar]
- Antonatos, S.; Akritidis, P.; Markatos, E.P.; Anagnostakis, K.G. Defending against Hitlist Worms Using Network Address Space Randomization. In Proceedings of the 2005 ACM Workshop on Rapid Malcode, Computer Networks, New York, NY, USA, 11 November 2005; pp. 3471–3490. [Google Scholar]
- Kewley, D.; Fink, R.; Lowry, J.; Dean, M. Dynamic Approaches to Thwart Adversary Intelligence Gathering. In Proceedings of the DARPA Information Survivability Conference and exposition II (DISCEX), Anaheim, CA, USA, 12–14 June 2001; Volume 1, pp. 176–185. [Google Scholar]
- Sharma, D.P.; Kim, D.S.; Yoon, S.; Lim, H.; Cho, J.; Moore, T.J. FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. In Proceedings of the IEEE TrustCom, New York, NY, USA, 1–3 August 2018; pp. 579–587. [Google Scholar]
- Xu, X.; Hu, H.; Liu, Y.; Zhang, H.; Chang, D. An Adaptive IP Hopping Approach for Moving Target Defense Using a Light-Weight CNN Detector. Secur. Commun. Netw. 2021, 2021, 8848473. [Google Scholar] [CrossRef]
- Luo, Y.B.; Wang, B.S.; Wang, X.F.; Hu, X.F.; Cai, G.L.; Sun, H. RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries. In Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015; pp. 263–270. [Google Scholar]
- Carroll, T.E.; Crouse, M.; Fulp, E.W.; Berenhaut, K.S. Analysis of Network Address Shuffling as a Moving Target Defense. In Proceedings of the IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 701–706. [Google Scholar]
- MacFarland, D.C.; Shue, C.A. The SDN shuffle: Creating a Moving-Target Defense Using Host-Based Software-Defined Networking. In Proceedings of the 2nd ACM Workshop on Moving Target Defense (MTD), Denver, CO, USA, 12 October 2015; pp. 37–41. [Google Scholar]
- Kampanakis, P.; Perros, H.; Beyene, T. SDN-Based Solutions for Moving Target Defense Network Protection. In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Sydney, NSW, Australia, 19 June 2014; pp. 1–6. [Google Scholar]
- Achleitner, S.; Porta, T.L.; McDaniel, P.; Sugrim, S.; Krishnamurthy, S.V.; Chadha, R. Deceiving network reconnaissance using SDN-based virtual topologies. IEEE Trans. Netw. Serv. Manag. 2017, 14, 1098–1112. [Google Scholar] [CrossRef]
- Achleitner, S.; La Porta, T.; McDaniel, P.; Sugrim, S.; Krishnamurthy, S.V.; Chadha, R. Cyber Deception: Virtual Networks to Defend Insider Reconnaissance. In Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, New York, NY, USA, 28 October 2016; pp. 57–68. [Google Scholar]
- Hong, J.B.; Yoon, S.; Lim, H.; Kim, D.S. Optimized Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTD. In Proceedings of the IEEE Symposium on Reliable Distributed Systems (SRDS), Hong Kong, China, 26–29 September 2017. [Google Scholar]
- Xu, X.; Hu, H.; Liu, Y.; Tan, J.; Zhang, H.; Song, H. Moving target defense of routing randomization with deep reinforcement learning against eavesdropping attack. Digit. Commun. Netw. 2022, 8, 373–387. [Google Scholar] [CrossRef]
- Trassare, S.T.; Beverly, R.; Alderson, D. A Technique for Network Topology Deception. In Proceedings of the MILCOM 2013—2013 IEEE Military Communications Conference, San Diego, CA, USA, 18–20 November 2013; pp. 1795–1800. [Google Scholar]
- Hong, J.B.; Enoch, S.Y.; Kim, D.S.; Nhlabatsi, A.; Fetais, N.; Khan, K.M. Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Comput. Secur. 2018, 79, 33–52. [Google Scholar] [CrossRef]
- Danev, B.; Masti, R.; Karame, G.; Capkun, S. Enabling Secure VM-vTPM Migration in Private Clouds. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC), New York, NY, USA, 5–9 December 2011; pp. 187–196. [Google Scholar]
- Zhang, Y.; Li, M.; Bai, K.; Yu, M.; Zang, W. Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds. In Proceedings of the IFIP International Information Security Conference, Heraklion, Greece, 4–6 June 2012; pp. 388–399. [Google Scholar]
- Penner, T.; Guirguis, M. Combating the Bandits in the Cloud: A Moving Target Defense Approach. In Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, Madrid, Spain, 14–17 May 2017; pp. 411–420. [Google Scholar]
- Peng, W.; Li, F.; Huang, C.-T.; Zou, X. A Moving Target Defense Strategy for Cloud-Based Services with Heterogeneous and Dynamic Attack Surfaces. In Proceedings of the IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 804–809. [Google Scholar]
- Jia, Q.; Sun, K.; Stavrou, A. Motag: Moving Target Defense against Internet Denial of Service Attacks. In Proceedings of the 22nd International Conference on Computer Communications and Networks (ICCCN), Nassau, Bahamas, 30 July–2 August 2013; pp. 1–9. [Google Scholar]
- Thompson, M.; Evans, N.; Kisekka, V. Multiple OS Rotational Environment an Implemented Moving Target Defense. In Proceedings of the 2014 7th International Symposium on Resilient Control Systems (ISRCS), Denver, CO, USA, 19–21 August 2014; pp. 1–6. [Google Scholar]
- Colbaugh, R.; Glass, K. Predictability-Oriented Defense against Adaptive Adversaries. In Proceedings of the 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Seoul, Republic of Korea, 14–17 October 2012; pp. 2721–2727. [Google Scholar]
- Huang, Y.; Ghosh, A.K.; Bracewell, T.; Mastropietro, B. A Security Evaluation of a Novel Resilient Web Serving Architecture: Lessons Learned Through Industry/Academia Collaboration. In Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), Chicago, IL, USA, 28 June–1 July 2010; pp. 188–193. [Google Scholar]
- Jackson, T.; Salamat, B.; Homescu, A.; Manivannan, K.; Wagner, G.; Gal, A.; Brunthaler, S.; Wimmer, C.; Franz, M. Compiler-generated software diversity. In Moving Target Defense; Springer: Berlin/Heidelberg, Germany, 2011; pp. 77–98. [Google Scholar]
- Vikram, S.; Yang, C.; Gu, G. Nomad: Towards Nonintrusive Moving-Target Defense against Web Bots. In Proceedings of the IEEE Conference on Communications and Network Security (CNS), National Harbor, MD, USA, 14–16 October 2013; pp. 55–63. [Google Scholar]
- Casola, V.; Benedictis, A.D.; Albanese, M. A Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices. In Proceedings of the IEEE 14th International Conference on Information Reuse Integration (IRI), San Francisco, CA, USA, 14–16 August 2013; pp. 22–29. [Google Scholar]
- Yuan, E.; Malek, S.; Schmerl, B.; Garlan, D.; Gennari, J. Architecture-Based Self-Protecting Software Systems. In Proceedings of the 9th International ACM SIGSOFT Conference on Quality of Software Architectures, New York, NY, USA, 17–21 June 2013; pp. 33–42. [Google Scholar]
- Larsen, P.; Homescu, A.; Brunthaler, S.; Franz, M. SoK: Automated Software Diversity. In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 18–21 May 2014; pp. 276–291. [Google Scholar]
- Kc, G.S.; Keromytis, A.D.; Prevelakis, V. Countering Code-Injection Attacks with Instruction-Set Randomization. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), New York, NY, USA, 27–30 October 2003; pp. 272–280. [Google Scholar]
- Portokalidis, G.; Keromytis, A.D. Global ISR: Toward a Comprehensive Defense against Unauthorized Code Execution. In Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats; Springer: New York, NY, USA, 2011; pp. 49–76. [Google Scholar]
- Azab, M.; Hassan, R.; Eltoweissy, M. Chameleonsoft: A Moving Target Defense System. In Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, FL, USA, 15–18 October 2011; pp. 241–250. [Google Scholar]
- Kohli, T. An Efficient Threat Detection Framework for Docker Containers using AppArmor Profile and Clair Vulnerability Scanning Tool. Master’s Thesis, National College of Ireland, Dublin, Ireland, 2022. [Google Scholar]
- Okhravi, H.; Comella, A.; Robinson, E.; Haines, J. Creating a cyber moving target for critical infrastructure applications using platform diversity. Int. J. Crit. Infrastruct. Prot. 2012, 5, 30–39. [Google Scholar] [CrossRef]
- Fraunholz, D.; Zimmermann, M.; Schotten, H.D. An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy. In Proceedings of the 2017 19th International Conference on Advanced Communication Technology (ICACT), Pyeongchang, Republic of Korea, 19–22 February 2017; pp. 53–57. [Google Scholar]
- Debroy, S.; Calyam, P.; Nguyen, M.; Neupane, R.L.; Mukherjee, B.; Eeralla, A.K.; Salah, K. Frequency-minimal utility-maximal moving target defense against DDoS in SDN-based systems. IEEE Trans. Netw. Serv. Manag. 2020, 17, 890–903. [Google Scholar] [CrossRef]
- Aseeri, A.; Netjinda, N.; Hewett, R. Alleviating Eavesdropping Attacks in Software-Defined Networking Data Plane. In Proceedings of the 12th Annual Conference on Cyber and Information Security Research, New York, NY, USA, 4–6 April 2017; pp. 1–8. [Google Scholar]
- Li, Y.; Dai, R.; Zhang, J. Morphing Communications of Cyber-Physical Systems Towards Moving-Target Defense. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 592–598. [Google Scholar]
- Torquato, M.; Vieira, M. Moving target defense in cloud computing: A systematic mapping study. Comput. Secur. 2020, 92, 101742. [Google Scholar] [CrossRef]
- Duan, Q.; Al-Shaer, E.; Jafarian, H. Efficient Random Route Mutation Considering Flow and Network Constraints. In Proceedings of the IEEE Conference on Communications and Network Security (CNS), National Harbor, MD, USA, 14–16 October 2013; pp. 260–268. [Google Scholar]
- Liu, J.; Zhang, H.; Guo, Z. A defense mechanism of random routing mutation in SDN. IEICE Trans. Inf. Syst. 2017, 100, 1046–1054. [Google Scholar] [CrossRef]
- Zhou, Z.; Xu, C.; Kuang, X. An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism. In Proceedings of the IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; pp. 1–6. [Google Scholar]
- Ganz, J.; Peisert, S. ASLR: How Robust Is the Randomness? In Proceedings of the 2017 IEEE Cybersecurity Development (SecDev), Cambridge, MA, USA, 24–26 September 2017; pp. 34–41. [Google Scholar]
- Bittau, A.; Belay, A.; Mashtizadeh, A.; Mazières, D.; Boneh, D. Hacking Blind. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 18–21 May 2014; pp. 227–242. [Google Scholar]
- Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; MIT Press: Cambridge, MA, USA, 2016. [Google Scholar]
- LeCun, Y.; Bengio, Y.; Hinton, G. Deep Learning. Nature 2015, 521, 436–444. [Google Scholar] [CrossRef]
- Eghtesad, T.; Vorobeychik, Y.; Laszka, A. Adversarial Deep Reinforcement Learning based Adaptive Moving Target Defense. In Decision and Game Theory for Security; GameSec 2020; Lecture Notes in Computer Science; Springer: Cham, Switzerland, 2020. [Google Scholar]
- Sengupta, S.; Kambhampati, S. Multi-agent Reinforcement Learning in Bayesian Stackelberg Markov Games for Adaptive Moving Target Defense. arXiv 2007, arXiv:2007.10457. [Google Scholar]
- Zhu, M.; Hu, Z.; Liu, P. Reinforcement Learning Algorithms for Adaptive Cyber Defense against Heartbleed. In Proceedings of the 1st ACM Workshop on Moving Target Defense (MTD), New York, NY, USA, 7 November 2014; pp. 51–58. [Google Scholar]
- Gao, C.; Wang, Y. Reinforcement learning based self-adaptive moving target defense against DDoS attacks. J. Phys. Conf. Ser. 2021, 1812, 012039. [Google Scholar] [CrossRef]
- Chhabra, A.; Mohapatra, P. Moving Target Defense against Adversarial Machine Learning. In Proceedings of the 8th ACM Workshop on Moving Target Defense (MTD ‘21), Virtual Event, Republic of Korea, 15 November 2021; Association for Computing Machinery: New York, NY, USA, 2021; pp. 29–30. [Google Scholar]
- Huang, Y.; Huang, L.; Zhu, Q. Reinforcement Learning for feedback-enabled cyber resilience. Annu. Surv. Control 2022, 53, 273–295. [Google Scholar] [CrossRef]
- Tozer, B.; Mazzuchi, T.; Sarkani, S. Optimizing Attack Surface and Configuration Diversity Using Multi-Objective Reinforcement Learning. In Proceedings of the IEEE 14th International Conference on Machine Learning and Applications (ICMLA), Miami, FL, USA, 9–11 December 2015; pp. 144–149. [Google Scholar]
- Farchi, E.; Shehory, O.; Barash, G. Defending via strategic ML selection. arXiv 2019, arXiv:1904.00737. [Google Scholar]
- Wang, H.; Li, F.; Chen, S. Towards Cost-Effective Moving Target Defense against DDoS and Covert Channel Attacks. In Proceedings of the 2016 ACM Workshop on Moving Target Defense (MTD ’16), Vienna, Austria, 24 October 2016; Association for Computing Machinery: New York, NY, USA, 2016; pp. 15–25. [Google Scholar]
- Song, Q.; Yan, Z.; Tan, R. Moving target defense for deep visual sensing against adversarial examples. arXiv 2019, arXiv:1905.13148. [Google Scholar]
- Sengupta, S.; Chakraborti, T.; Kambhampati, S. MTDeep–Boosting the Security of Deep Neural Nets against Adversarial Attacks with Moving Target Defense. In Proceedings of the 10th International Conference on Decision and Game Theory for Security, GameSec 2019, Stockholm, Sweden, 30 October–1 November 2019; pp. 479–491. [Google Scholar]
- Soliman, H.S. Neural Network Model for Compressing/Decompressing Image/Acoustic Data Files. U.S. Patent No. 6,608,924, 19 August 2003. [Google Scholar]
- Wang, Z.; Liu, M.; Cheng, Y.; Wang, R. Robustly Fitting and Forecasting Dynamical Data with Electromagnetically Coupled Artificial Neural Network: A Data Compression Method. IEEE Trans. Neural Netw. 2007, 28, 1397–1410. [Google Scholar] [CrossRef] [PubMed]
- Cui, W.; Jiang, F.; Gao, X.; Tao, W.; Zhao, D. Deep Neural Network Based Sparse Measurement Matrix for Image Compressed Sensing. In Proceedings of the 2018 25th IEEE International Conference on Image Processing (ICIP), Athens, Greece, 7–10 October 2018; pp. 3883–3887. [Google Scholar]
- Hourri, S.; Nikolov, N.S.; Kharroubi, J. Convolutional neural network vectors for speaker recognition. Int. J. Speech Technol. 2021, 24, 389–400. [Google Scholar] [CrossRef]
- Song, H.; Mao, H.; Dally, W.J. Deep Compression: Compressing Deep Neural Network with Pruning, Trained Quantization and Huffman Coding. arXiv 2015, arXiv:1510.00149. [Google Scholar]
- Tung, F.; Mori, G. Deep Neural Network Compression by In-Parallel Pruning-Quantization. IEEE Trans. Pattern Anal. Mach. Intell. 2020, 42, 568–579. [Google Scholar] [CrossRef] [PubMed]
- Duohe, M.; Lei, C.; Wang, L.; Zhang, H.; Xu, Z.; Li, M. A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. In Proceedings of the International Conference on Information, Communications and Signal Processing, Singapore, 29 November–2 December 2016. [Google Scholar]
- Sutton, R.S.; Barto, A.G. Reinforcement Learning: An Introduction, 2nd ed.; Massachusetts Institute of Technology: Cambridge, MA, USA, 2018. [Google Scholar]
- Pawlick, J.; Colbert, E.; Zhu, Q. A Game-theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy. ACM Comput. Surv. 2020, 52, 82. [Google Scholar] [CrossRef]
- Tan, J.; Zhang, H.; Zhang, H. Optimal temporospatial strategy selection approach to moving target defense: A FlipIt differential game model. Comput. Secur. 2021, 108, 102342. [Google Scholar] [CrossRef]
- Colbaugh, R.; Glass, K. Moving target defense for adaptive adversaries. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics, Seattle, WA, USA, 4–7 June 2013; pp. 50–55. [Google Scholar]
- Wang, S.; Wang, J.; Pei, Q.; Tang, G.; Wang, Y.; Liu, X. Active deception defense method based on dynamic camouflage network. J. Commun. 2020, 41, 97–111. [Google Scholar]
- Kumari, S.; Yadav, R.J.; Namasudra, S.; Hsu, C. Intelligent deception techniques against adversarial attack on the industrial system. Int. J. Intell. Syst. 2021, 36, 2412–2437. [Google Scholar] [CrossRef]
Refs. | Year | MTD Mechanism | Intelligent MTD Introduction | Intelligent MTD Traits | Intelligent MTD Development Trend | Insights |
---|---|---|---|---|---|---|
Okhravi et al. [3,4] | 2013, 2018 | Five layers | - | - | - | From passive defense into proactive defense |
Cai et al. [5] | 2016 | Three layers | - | - | - | Function-and-movement model |
Lei et al. [6] | 2018 | Four layers | √ | Coarsely | Coarsely | From proactive defense into reactive defense |
Zheng et al. [7] | 2019 | Three layers | Coarsely | Coarsely | - | The perspective of architectural structure |
Sengupta et al. [8] | 2019 | Five attack surface shifting ways | Coarsely | Coarsely | - | A simple and yet general notion of defense |
Cho et al. [9] | 2020 | SDR | √ | Partially | Coarsely | Toward proactive, adaptive defense |
Sun et al. [10] | 2020 | GT-related | GT-related MLs | - | - | Optimized defense behaviors |
Our survey | - | SDR/Five layers | √ | √ | √ | Intelligently affordable, optimized and self-adaptive defense |
The Attack Surfaces Often Utilized in Recent Years (Since ′18) | ||
---|---|---|
Network L. | ❏IP address/Port [11,12,13,14,15,16,17,18,19,20,21,22,23] | ❏Route/Network topology [24,25,26,27,28] |
Platform L. | ❏Virtual Machines [29,30,31,32,33] | ❏Proxies [34] |
Rt. Env. L. | ❏Operation Systems [35,36,37] | |
Software L. | ❏Software [38,39,40,41,42] | |
Data L. | ❏Instruction sets [43,44] | ❏Codes [45,46] |
Categories | Typical Techniques | Features | ||||
---|---|---|---|---|---|---|
Network L. | Platform L. | Ex. Env. L. | Software L. | Data L. | ||
Shuffling | IP hopping [11] | VM migration [29] | OS rotation [35] | Software rearrangement [39] | Keys rotation [40] | These techniques own a low burden in terms of development costs and resource consumption, ease of operation and high compatibility. Security is highly dependent on the quality of existing techniques. |
Diversity | Diverse network configurations [46] | Multi-Dockers [47] | Diverse OSes [37] | Diverse software [42] | Diverse codes [45] | Broadly similar to shuffling techniques, they also result in sacrificing additional defense costs due to the need to prepare different systems or components. |
Redundancy | Honeypot [48] | OS redundancy [30] | OS redundancy [35] | Software components redundancy [41] | - | The service availability requirements for users are higher than the above two kinds of techniques, and it is easier to extend the attack surface if they are not executed correctly. |
|
| |
|
| |
|
|
Towards affordable |
|
|
|
Towards optimized | |||
Towards self-adaptive |
|
|
|
|
|
|
Factors | Explanations |
---|---|
Actual participants | Is there only one attacker and one defender? Realistic situations are likely to face multiple agents. |
Rationality profile | Perfect rationality or bounded rationality. |
Environment | The environment includes knowledge about the opponent. In most cases, the attacker has the advantage in this respect and has much more incomplete information about the defender. |
Play order | In most cases, the order is leader-follower (Stackelberg game), but there are also cases where cards can be played simultaneously, depending on the actual situation. |
Available strategies | We cannot exhaust all possible types of attacks in the same game, nor can we deploy all possible MTD mechanisms in the same system. |
Revenue measurement | For the defender, the revenue design is more complex, including but not limited to system security, system overhead, system QoS, and users’ experience. |
Ref. | RL Method | Attack | Participants | Rationality | Environment | Order |
---|---|---|---|---|---|---|
Zhu et al. [62] | Iterative RL | Heart bleed | Single-agent | Perfect | Unknown/Incomplete | Stackelberg |
Gao et al. [63] | Basic RL | DDoS | Single-agent | Perfect | Known | - |
Anshuman et al. [64] | - | Adversarial attacks | Single-agent | Perfect | Known | Stackelberg |
Xu et al. [27] | DDPG | Eavesdropping attacks | Single-agent | Perfect | Known | - |
Farchi et al. [67] | Multi-learner RL | Adversarial attacks | Multi-agent | Perfect | Known | Stackelberg |
Tozer et al. [66] | Multi-object RL | GENERALIZED | Multi-agent | Perfect | Known | - |
Huang et al. [65] | RLHF | GENERALIZED | Single agent | Perfect | Partially observable | - |
Taha et al. [60] | Double oracle | GENERALIZED | Multi-agent | Bounded | Partially observable | Stackelberg |
Sengupta et al. [61] | Q-Learning | GENERALIZED | Multi-agent | Bounded | Unknown/Incomplete | Bayesian Stackelberg |
Ref. | ML Method | Taxonomy | Affordability | Optimization |
---|---|---|---|---|
Song et al. [69] | DL | ML-based | - | √ |
Xu et al. [19] | CNN | √ | √ | |
Smith et al. [14] | Neuro-evolution | ML + defense mechanism-based | √ | - |
Fraunholz et al. [48] | Clustering | - | √ | |
Colbaugh et al. [36] | RL | ML + GT-based | - | √ |
Sengupta et al. [70] | DNN | - | √ |
Towards Affordable | Towards Optimized | Towards Self-Adaptive | |
---|---|---|---|
Main ideas |
|
|
|
Merits and demerits |
|
|
|
Challenges |
|
|
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Sun, R.; Zhu, Y.; Fei, J.; Chen, X. A Survey on Moving Target Defense: Intelligently Affordable, Optimized and Self-Adaptive. Appl. Sci. 2023, 13, 5367. https://doi.org/10.3390/app13095367
Sun R, Zhu Y, Fei J, Chen X. A Survey on Moving Target Defense: Intelligently Affordable, Optimized and Self-Adaptive. Applied Sciences. 2023; 13(9):5367. https://doi.org/10.3390/app13095367
Chicago/Turabian StyleSun, Rongbo, Yuefei Zhu, Jinlong Fei, and Xingyu Chen. 2023. "A Survey on Moving Target Defense: Intelligently Affordable, Optimized and Self-Adaptive" Applied Sciences 13, no. 9: 5367. https://doi.org/10.3390/app13095367
APA StyleSun, R., Zhu, Y., Fei, J., & Chen, X. (2023). A Survey on Moving Target Defense: Intelligently Affordable, Optimized and Self-Adaptive. Applied Sciences, 13(9), 5367. https://doi.org/10.3390/app13095367