Setting up a decoy network may help deflect a hacker's hits

September 08, 2016

Computer networks may never float like a butterfly, but Penn State information scientists suggest that creating nimble networks that can sense jabs from hackers could help deflect the stinging blows of those attacks.

"Because of the static nature of a computer network, the attacker has a time advantage," said Dinghao Wu, assistant professor of information sciences and technology. "Hackers can spend a month, two months, six months or more just studying the network and finding vulnerabilities. When they return to use that information to attack, the network typically has not changed and those vulnerabilities are still there, too."

The researchers, who release their findings at the Information Security Conference held in Honolulu today (Sept. 8), created a computer defense system that senses possible malicious probes of the network and then redirects that attack to a virtual network that offers little information about the real network.

Typically, the first step a hacker takes when attacking a network is a probe to gain information about the system -- for example, what software types and versions, operating systems and hardware the network is running. Instead of trying to stop these hackers' scans, researchers set up a detector to monitor incoming web traffic to determine when hackers are scanning the network.

"We can't realistically stop all scanning activities, but we can usually tell when a malicious scan is happening," said Wu. "If it's a large-scale scan, it is usually malicious."

Once a malicious scan is detected, the researchers use a network device -- called a reflector -- to redirect that traffic to a decoy, or shadow network, according to Li Wang, a doctoral candidate in information sciences and technology, who worked with Wu. The shadow network is isolated and invisible from the real network, but can mimic the structure of a physical network to fool the hackers into believing they are receiving information about an actual network.

"A typical strategy would be to create a shadow network environment that has the same look as the protection domain," said Wang. "It can have the same number of nodes, network topology and configurations to fool the hacker. These shadow networks can be created to simulate complex network structures."

The system, which is a type of defense known in the computer industry as a moving target defense, also gives network administrators the option to more easily change parts of the shadow network's virtual system, making it even more difficult for hackers to assess the success of their scans.

Because the reflector can act as a regular network device when no malicious attacks are present, there should be little effect on the real network's performance and functionality, according to Wu.

The researchers created a prototype for the system and tested it on a simulated network that runs on a computer -- a virtual local area network. This allowed them to simulate both the attack and defense without using an actual network. The prototype was able to sense the incoming scan and deflect it to a shadow network.

According to the researchers, the information that was gathered from the attack scan only produced information from the shadow network. Wu said the next step is to deploy the system in an actual network.
The Penn State Fund for Innovation, National Science Foundation and the Office of Naval Research supported this work.

Penn State

Related Computer Articles from Brightsurf:

UCLA computer scientists set benchmarks to optimize quantum computer performance
Two UCLA computer scientists have shown that existing compilers, which tell quantum computers how to use their circuits to execute quantum programs, inhibit the computers' ability to achieve optimal performance.

Digitize your dog into a computer game
Researchers from CAMERA at the University of Bath have developed motion capture technology that enables you to digitise your dog without a motion capture suit and using only one camera.

Stabilizing brain-computer interfaces
Researchers from Carnegie Mellon University (CMU) and the University of Pittsburgh (Pitt) have published research in Nature Biomedical Engineering that will drastically improve brain-computer interfaces and their ability to remain stabilized during use, greatly reducing or potentially eliminating the need to recalibrate these devices during or between experiments.

Computer-generated genomes
Professor Beat Christen, ETH Zurich to speak in the AAAS 2020 session, 'Synthetic Biology: Digital Design of Living Systems.' Christen will describe how computational algorithms paired with chemical DNA synthesis enable digital manufacturing of biological systems up to the size of entire microbial genomes.

Computer-based weather forecast: New algorithm outperforms mainframe computer systems
The exponential growth in computer processing power seen over the past 60 years may soon come to a halt.

A computer that understands how you feel
Neuroscientists have developed a brain-inspired computer system that can look at an image and determine what emotion it evokes in people.

Computer program looks five minutes into the future
Scientists from the University of Bonn have developed software that can look minutes into the future: The program learns the typical sequence of actions, such as cooking, from video sequences.

Computer redesigns enzyme
University of Groningen biotechnologists used a computational method to redesign aspartase and convert it to a catalyst for asymmetric hydroamination reactions.

Mining for gold with a computer
Engineers from Texas A&M University and Virginia Tech report important new insights into nanoporous gold -- a material with growing applications in several areas, including energy storage and biomedical devices -- all without stepping into a lab.

Teaching quantum physics to a computer
An international collaboration led by ETH physicists has used machine learning to teach a computer how to predict the outcomes of quantum experiments.

Read More: Computer News and Computer Current Events is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to