Abstract
Remote cyberattacks can be started from unlimited distance. These remote attacks include special actions which allow attackers to compromise remote systems. During the first step of attacks, reconnaissance step, attackers attempt to gather information about their intended target(s). For network-based systems, figuring out the IP address(es) of the target(s) is critical to the success of the attack. There are several countermeasures to protect systems from these attacks such as firewalls and intrusion detection and prevention systems (IDPS). Unfortunately, zero-day exploits that use undisclosed or uncorrected computer application vulnerabilities can defeat the best firewalls and IDPSs. Regardless of the strength of these countermeasures used in practice, the use of static IP addresses leaves the target vulnerable in two ways. First, they are discoverable. Second, after accessing the target, the attacker can maintain this access for a long time. So, an effective defense is a mechanism to change the IP addresses randomly and dynamically (IP hopping). These mechanisms are called moving target defenses (MTDs). In this chapter, some novel methods based on IPv6 (and Mobile IPv6) are explained to thwart remote attacks by randomly changing the IP address(es) of the target(s).
Original language | English (US) |
---|---|
Title of host publication | Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense |
Publisher | Springer International Publishing |
Pages | 983-1010 |
Number of pages | 28 |
ISBN (Electronic) | 9783319090696 |
ISBN (Print) | 9783319090689 |
DOIs | |
State | Published - Oct 5 2018 |
All Science Journal Classification (ASJC) codes
- Social Sciences(all)
- Computer Science(all)
- Economics, Econometrics and Finance(all)
- Business, Management and Accounting(all)