Implementation of network moving target defense in embedded systems
dc.contributor.advisor | Doug W. Jacobson | |
dc.contributor.author | Finstad, Robert | |
dc.contributor.department | Department of Electrical and Computer Engineering | |
dc.date | 2021-01-16T18:20:31.000 | |
dc.date.accessioned | 2021-02-25T21:38:13Z | |
dc.date.available | 2021-02-25T21:38:13Z | |
dc.date.copyright | Tue Dec 01 00:00:00 UTC 2020 | |
dc.date.embargo | 2020-11-24 | |
dc.date.issued | 2020-01-01 | |
dc.description.abstract | <p>Moving target defense provides opportunities for adaptive defense in embedded systems. A great deal of work has been done on incorporating moving target defense techniques into enterprise systems to increase the cost to attackers and level the playing field. A smaller body of work focuses on implementing these techniques in embedded systems, which can greatly benefit from adaptive self-defense techniques. This work implements a network shuffling proof of concept in the Zephyr real time operating system to tackle the challenge of incorporating shuffling techniques into embedded systems. A host-centric, high security implementation is provided which maximizes attacker uncertainty and minimizes the impact of host compromise. Identifiers are utilized at the datalink, network, and transport layers and rotated per connection using keys shared between host pairs.Existing shuffling schemes are explored, including those targeted to IoT contexts. Existing limitations in protecting embedded systems are considered along with the presented by moving target defense. The design details and implementation of incorporating a moving target defense module to in the Zephyr networking stack is provided. The protection provided by the scheme is evaluated and it is compared to existing address shuffling schemes. Future work in better handling data forwarding and collisions in the proof of concept scheme are considered. Options for adapting and building on the scheme to meet the needs of system designers are explored. This work provides system designers with insights into implementing address shuffling in embedded systems.</p> | |
dc.format.mimetype | application/pdf | |
dc.identifier | archive/lib.dr.iastate.edu/etd/18309/ | |
dc.identifier.articleid | 9316 | |
dc.identifier.contextkey | 21104731 | |
dc.identifier.doi | https://doi.org/10.31274/etd-20210114-44 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | etd/18309 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/94461 | |
dc.language.iso | en | |
dc.source.bitstream | archive/lib.dr.iastate.edu/etd/18309/Finstad_iastate_0097M_19191.pdf|||Fri Jan 14 21:40:11 UTC 2022 | |
dc.subject.keywords | Cybersecurity | |
dc.subject.keywords | Embedded Systems | |
dc.subject.keywords | Moving Target Defense | |
dc.subject.keywords | Network Shuffling | |
dc.subject.keywords | Zephyr | |
dc.title | Implementation of network moving target defense in embedded systems | |
dc.type | dissertation | |
dc.type.genre | dissertation | |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | a75a044c-d11e-44cd-af4f-dab1d83339ff | |
thesis.degree.discipline | Cyber Security | |
thesis.degree.level | dissertation | |
thesis.degree.name | Master of Science |
File
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Finstad_iastate_0097M_19191.pdf
- Size:
- 517.37 KB
- Format:
- Adobe Portable Document Format
- Description: