Run or Hide? Both! A method based on IPv6 address switching to Escape while being hidden

Maxime Ayrault, Etienne Borde, Ulrich Kühne

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

An increasing number of devices of our everyday life are referred to as connected objects. Most of them need an Internet connection, and are thus provided with a public IP address. With these IP addresses come new security threats as attackers may attempt to attack a whole family of objects. This problem becomes even more worrying when considering safety critical objects (i.e. their failures can have catastrophic consequences). In this paper we propose a Moving Target Defense (MTD) technique at the network level, that consists in reassigning objects' IP addresses in order to escape from attackers both outside or inside the object's subnetwork. We propose different variants of this defense allowing for a trade-off between (i) increasing the security level, and (ii) lowering the network load overhead due to the defense. As opposed to existing works, we also define a method to maintain the objects' connectivity while reassigning IP addresses. A motivating example from the automotive domain is used to illustrate the applicability of this work.

Original languageEnglish
Title of host publicationMTD 2019 - Proceedings of the 6th ACM Workshop on Moving Target Defense
PublisherAssociation for Computing Machinery
Pages47-56
Number of pages10
ISBN (Electronic)9781450368285
DOIs
Publication statusPublished - 11 Nov 2019
Externally publishedYes
Event6th ACM Workshop on Moving Target Defense, MTD 2019, co-located with the 26th ACM Conference on Computer and Communications Security, CCS 2019 - London, United Kingdom
Duration: 11 Nov 2019 → …

Publication series

NameProceedings of the ACM Conference on Computer and Communications Security
ISSN (Print)1543-7221

Conference

Conference6th ACM Workshop on Moving Target Defense, MTD 2019, co-located with the 26th ACM Conference on Computer and Communications Security, CCS 2019
Country/TerritoryUnited Kingdom
CityLondon
Period11/11/19 → …

Keywords

  • Adaptive defenses
  • Dynamic network configuration
  • IPv6
  • IoT
  • MTD
  • System diversification techniques

Fingerprint

Dive into the research topics of 'Run or Hide? Both! A method based on IPv6 address switching to Escape while being hidden'. Together they form a unique fingerprint.

Cite this