Cargando…
A decoy chain deployment method based on SDN and NFV against penetration attack
Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) me...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5720676/ https://www.ncbi.nlm.nih.gov/pubmed/29216257 http://dx.doi.org/10.1371/journal.pone.0189095 |
_version_ | 1783284700862742528 |
---|---|
author | Zhao, Qi Zhang, Chuanhao Zhao, Zheng |
author_facet | Zhao, Qi Zhang, Chuanhao Zhao, Zheng |
author_sort | Zhao, Qi |
collection | PubMed |
description | Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack. |
format | Online Article Text |
id | pubmed-5720676 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-57206762017-12-15 A decoy chain deployment method based on SDN and NFV against penetration attack Zhao, Qi Zhang, Chuanhao Zhao, Zheng PLoS One Research Article Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack. Public Library of Science 2017-12-07 /pmc/articles/PMC5720676/ /pubmed/29216257 http://dx.doi.org/10.1371/journal.pone.0189095 Text en © 2017 Zhao et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Zhao, Qi Zhang, Chuanhao Zhao, Zheng A decoy chain deployment method based on SDN and NFV against penetration attack |
title | A decoy chain deployment method based on SDN and NFV against penetration attack |
title_full | A decoy chain deployment method based on SDN and NFV against penetration attack |
title_fullStr | A decoy chain deployment method based on SDN and NFV against penetration attack |
title_full_unstemmed | A decoy chain deployment method based on SDN and NFV against penetration attack |
title_short | A decoy chain deployment method based on SDN and NFV against penetration attack |
title_sort | decoy chain deployment method based on sdn and nfv against penetration attack |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5720676/ https://www.ncbi.nlm.nih.gov/pubmed/29216257 http://dx.doi.org/10.1371/journal.pone.0189095 |
work_keys_str_mv | AT zhaoqi adecoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack AT zhangchuanhao adecoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack AT zhaozheng adecoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack AT zhaoqi decoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack AT zhangchuanhao decoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack AT zhaozheng decoychaindeploymentmethodbasedonsdnandnfvagainstpenetrationattack |