Abstract
The DARPA Information Assurance Program did initial
research in the area of dynamic network defense, trying to
prove that dynamic network reconfiguration would inhibit
an adversary’s ability to gather intelligence, and thus
degrade the ability to successfully launch an attack. A
technique that enabled dynamic network address
translation of the IP address and TCP port number
combinations in packet headers was implemented in an
experimental network. Two tests were conducted: one to
demonstrate that it is possible to disrupt an adversary’s
ability to sniff network traffic effectively, and another to
show that the ability of intrusion detection tools to detect an
adversary can be improved. The tests were successful.
1. Introduction
The Defense Advanced Research Projects Agency
(DARPA) Information Assurance (IA) Program has been
focusing on researching and developing concepts of
strategic cyber defense for the past three years. One of the
program’s grand hypotheses states the following: Dynamic
modification of defensive structure improves system
assurance. It is hypothesized that if the components of a
network remain unchanged over time, adversaries will have
high confidence that the intelligence they gather prior to an
attack will remain valid throughout the execution of the
attack. On the other hand, if the network has dynamic
characteristics, the intelligence gathered by the adversary
prior to an attack would be time-limited, thus inhibiting the
attack.
A technique was developed under the Information
Assurance Program to dynamically reassign Internet
protocol (IP) address space feeding into a predesignated
enclave for the purpose of confusing any would-be
adversaries sniffing the network. This technique is called
dynamic network address translation (DYNAT). Two
experiments were run on the IA program to test this
dynamic mechanism. The first experiment explored the
effect of the technique on the adversary’s ability to map a
network, and the second experiment focused on the
technique’s ability to be implemented as an intrusion
detection device in addition to a network address translation
device. This paper presents an overview of the DYNAT
technology along with the results of the two experiments.
2. Background
A series of brainstorming sessions were conducted to
explore the idea of dynamic defense from a broad
perspective. All strategies for dynamic defense can be
characterized as configuration and posture changes that are:
• conducted continuously as a normal course of
action;
• conducted as a result of an internal event-based
condition; or
• conducted as a result of an external event-based
condition.
During the brainstorming sessions, it was realized that
adversaries follow a process. The IA program primarily
focuses on the well-resourced, risk-averse sophisticated
adversary, such as a nation state, that attacks a network in a
stealthy manner to either capture sensitive information or
disrupt normal operations. Adversaries in this class do not
attack a network for sport or to demonstrate prowess such
as amateur hackers do. These professional adversaries have
a well-defined attack process with specific goals, time
constraints, and budgets. Figure 1 shows the process for a
well-resourced adversary, as hypothesized during one of the
brainstorming sessions. Other adversaries with different
motivations and goals would have different processes and
are outside the scope of this experiment.
One observation was that the adversary process has
internal loops that circled through various planning stages
without leading to the goal. The one that looked most
fruitful was Live Network Discovery and we speculated that
keeping the adversary stuck in that loop would cause them
to consume all their resources which would lead them to
give up or continue under conditions of very high risk and
likelihood of failure.
Figure 2 shows an adversary work distribution, which
was hypothesized during the initial dynamic defense
brainstorming session. As shown, 95% of the adversary’s
time is spent preparing for the attack, while only 5% is
spent actually executing the attack. These numbers were
later validated in several laboratory experiments on the IA
program.
Our job as defenders is to disrupt the adversaries’ processes
so that they do not achieve their goals. One interesting
defensive idea we stumbled upon concerns network
visualization. As network defenders, we try improve our
view of the network and what is happening in it. We work
on improving intrusion detection systems that will catch the
adversary, visualization tools that allow us to watch the
network in real time, and instantaneous alerting systems.
An adversary also needs to visualize the network. Wouldn’t
Dorene Kewley, Russ Fink, John Lowry, Mike Dean
BBN Technologies, A Verizon Company
Dynamic Approaches to Thwart Adversary Intelligence Gathering
Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEXII’01)
0-7695-1212-7/01 $10.00 © 2001 IEEE