MitiBox: camouflage and deception for network scan mitigation

  • Authors:
  • Erwan Le Malécot

  • Affiliations:
  • Kyushu University, Institute of Systems, Information Technologies and Nanotechnologies

  • Venue:
  • HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

Reconnaissance, if successful, provides a definite tactical advantage in a battle and, as such, unsolicited computer network scans are often the precursors to more significant attacks against computer assets. In this paper, we introduce an original system whose purpose is to mitigate the benefits an attacker can expect from scanning a targeted network. In contrast to more traditional approaches, we propose to act a priori against scanning activity by continuously obfuscating the appearance of the targeted network through the combination of various simple mechanisms (i.e. random connection dropping and traffic forging). Moreover, we propose a method to immediately penalize hosts sending seemingly suspicious traffic to the targeted network while maintaining decent connectivity to cope with "false positives".