Cargando…

A decoy chain deployment method based on SDN and NFV against penetration attack

Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) me...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhao, Qi, Zhang, Chuanhao, Zhao, Zheng
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Public Library of Science 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5720676/
https://www.ncbi.nlm.nih.gov/pubmed/29216257
http://dx.doi.org/10.1371/journal.pone.0189095
_version_ 1783284700862742528
author Zhao, Qi
Zhang, Chuanhao
Zhao, Zheng
author_facet Zhao, Qi
Zhang, Chuanhao
Zhao, Zheng
author_sort Zhao, Qi
collection PubMed
description Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack.
format Online
Article
Text
id pubmed-5720676
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher Public Library of Science
record_format MEDLINE/PubMed
spelling pubmed-57206762017-12-15 A decoy chain deployment method based on SDN and NFV against penetration attack Zhao, Qi Zhang, Chuanhao Zhao, Zheng PLoS One Research Article Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack. Public Library of Science 2017-12-07 /pmc/articles/PMC5720676/ /pubmed/29216257 http://dx.doi.org/10.1371/journal.pone.0189095 Text en © 2017 Zhao et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
spellingShingle Research Article
Zhao, Qi
Zhang, Chuanhao
Zhao, Zheng
A decoy chain deployment method based on SDN and NFV against penetration attack
title A decoy chain deployment method based on SDN and NFV against penetration attack
title_full A decoy chain deployment method based on SDN and NFV against penetration attack
title_fullStr A decoy chain deployment method based on SDN and NFV against penetration attack
title_full_unstemmed A decoy chain deployment method based on SDN and NFV against penetration attack
title_short A decoy chain deployment method based on SDN and NFV against penetration attack
title_sort decoy chain deployment method based on sdn and nfv against penetration attack
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5720676/
https://www.ncbi.nlm.nih.gov/pubmed/29216257
http://dx.doi.org/10.1371/journal.pone.0189095
work_keys_str_mv AT zhaoqi adecoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack
AT zhangchuanhao adecoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack
AT zhaozheng adecoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack
AT zhaoqi decoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack
AT zhangchuanhao decoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack
AT zhaozheng decoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack