Submitted:
23 April 2025
Posted:
24 April 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
- Proposed a set of attack-path-based TTC metrics to estimate the mean time to compromise a smart device in an IoT network deploying the MTD defense mechanism. TTC-related metrics include mean TTC, minimum TTC, and maximum TTC, considering different skill levels of attackers.
- Devised a set of risk-based security metrics considering TTC and attack cost into account. These risk-based metrics compute the risk reduction with MTD mechanism in terms of shuffling rate and strategies.
- Conducted extensive simulation experiments to measure the effectiveness of the MTD methods deployed in IoT networks, and identified key factors that significantly influence the performance of the MTD methods.
2. Related Work
3. System Model
3.1. Network Model
3.2. Threat Model
- Beginner: These attackers use default scanning configurations and have limited knowledge of the target network. Their ability to interpret scan results is minimal, and they require significant effort to identify vulnerabilities and find usable exploits to attack the system.
- Intermediate: These attackers have a moderate understanding of IoT network structures and known vulnerabilities. They can customize scan parameters to focus on specific devices or services and are generally able to identify vulnerabilities. However, they may struggle to find or develop suitable exploits to compromise the targets effectively.
- Expert: Expert attackers possess deep knowledge of the IoT systems and employ stealthy or adaptive scanning techniques. They can efficiently discover vulnerabilities and are capable of locating or creating effective exploits, enabling them to compromise a wide range of heterogeneous devices with ease.
3.3. Defense Model
- Shuffling-based MTDs: Shuffling-based MTD methods periodically modify network attributes such as IP addresses, ports, or configurations in a fixed interval of time. These MTD methods hinder an attacker’s ability to maintain an accurate view of the system, invalidating reconnaissance efforts and narrowing the window for successful exploitation.
- Diversity-based MTDs: Diversity-based MTD methods dynamically change device characteristics such as operating systems (OS rotation), firmware versions, or application configurations to ensure that vulnerabilities of the IoT devices differ over time, reducing the risk of uniform exploitation.
4. Proposed Approach
4.1. Time-to-Compromise Metrics
- Attack process 1: In this scenario, an attacker has one or more known vulnerabilities and exploits ( i.e., with known vulnerabilities and known exploits). These attackers have all the required knowledge to attack the system.
- Attack process 2: In this process, an attacker has one or more known vulnerabilities but does not have any exploits on hand ( i.e., known vulnerabilities and unknown exploits). These attackers have partial knowledge about the target IoT network system.
- Attack process 3: These attacker has no known vulnerabilities and exploits (i.e., unknown vulnerabilities and unknown exploits). It means attackers do not have any knowledge about the target system. Attacker scans the network, finds vulnerabilities, and builds an exploit to launch the attack.
- =# of vulnerabilities exist in a host or a component,
- =# of exploits readily available for vulnerabilities of the host ,
- K=# of total non-duplicate vulnerabilities in vulnerability database,
- = shuffling rate of the host with MTD interval time ,
- s: attacker’s skill level, (e.g., for beginner, for intermediate, and for expert).
- day
- , where
-
, andwhere:
- : Expected number of tries
- : Number of vulnerabilities for which exploits are available or can be created by the attacker at their skill level
- : Number of vulnerabilities for which no exploits are available at their skill level
- s: Attacker skill level.
4.2. Security Risks Metrics
-
Security Risk Reduction Percentage (SRRP): SRRP can express in terms of percentage and it can be obtained as:Security Risk Reduction Percentage of a Network (SRRPN): SRRPN is the risk reduction of compromising all the hosts in the network using the MTD, and it can be obtained as:
- Security Risk on Path (SRP): It is a security risk on path metric that estimates the risk associated with the attack path. SRP is the sum of the security risk of the hosts on a path . SRP of an attack path, , for attack duration time t with starting at time obtained as:where, .
- Security Risk on Paths of a Network (SRPN): SRPN is a maximum security risk among all the attack paths, which can be obtained as:
5. Experiments & Results Analysis
5.1. Network Setting & Scenario Description
5.2. Results & Analysis
6. Conclusions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Communications Surveys & Tutorials 2015, 17, 2347–2376. [Google Scholar]
- Roman, R.; Zhou, J.; Lopez, J. On the features and challenges of security and privacy in distributed Internet-of-Things. Computer Networks 2013, 57, 2266–2279. [Google Scholar]
- Ge, M.; Hong, J.B.; Guttmann, W.; Kim, D.S. A Framework for Automating Security Analysis of the Internet of Things. Journal of Network and Computer Applications 2017, 83, 12–27. [Google Scholar] [CrossRef]
- Cho, J.H.; Sharma, D.P.; Alavizadeh, H.; Yoon, S.; Ben-Asher, N.; Moore, T.J.; Kim, D.S.; Lim, H.; Nelson, F.F. Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. IEEE Communications Surveys & Tutorials 2020, 22, 709–745. [Google Scholar]
- Jajodia, S.; Ghosh, A.K.; Swarup, V.; Wang, C.; Wang, X.S. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 1st ed.; Springer Publishing Company, Incorporated, 2011.
- Sharma, D.P. Software-Defined Networking Based Moving Target Defenses. 2020.
- Sharma, D.P.; Kim, D.S.; Yoon, S.; Lim, H.; Cho, J.; Moore, T.J. FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. In Proceedings of the Proceedings of the IEEE TrustCom, Aug. 2018, pp. 579–587.
- Sherburne, M.; Marchany, R.; Tront, J. Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid. In Proceedings of the Proceedings of the 9th Annual Cyber and Information Security Research Conference (CISR), 2014, pp. 37–40.
- Zeitz, K.; Cantrell, M.; Marchany, R.; Tront, J. Designing a Micro-moving Target IPv6 Defense for the Internet of Things. In Proceedings of the Proceedings of IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation (IoTDI), 2017, pp. 179–184.
- Sharma, D.P.; Cho, J.; Moore, T.J.; Nelson, F.F.; Lim, H.; Kim, D.S. Random Host and Service Multiplexing for Moving Target Defense in Software-Defined Networks. In Proceedings of the ICC 2019 - 2019 IEEE International Conference on Communications (ICC), May 2019, pp. 1–6.
- Casola, V.; Benedictis, A.D.; Albanese, M. A moving target defense approach for protecting resource-constrained distributed devices. In Proceedings of the Proceedings of the IEEE 14th International Conference on Information Reuse Integration (IRI), 2013, pp. 22–29.
- Mahmood, K.; Shila, D.M. Moving target defense for Internet-of-Things using context aware code partitioning and code diversification. In Proceedings of the Proceedings of the IEEE 3rd World Forum on Internet of Things (WF-IoT), 2016, pp. 329–330.
- Sharma, D.P.; Enoch, S.Y.; Cho, J.H.; Moore, T.J.; Nelson, F.F.; Lim, H.; Kim, D.S. Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense. Journal of Network and Computer Applications 2020, 170, 102805. [Google Scholar] [CrossRef]
- Hong, J.B.; Kim, D.S. Assessing the effectiveness of moving target defenses using security models. IEEE Transactions on Dependable and Secure Computing 2016, 13, 163–177. [Google Scholar] [CrossRef]
- Zaffarano, K.; Taylor, J.; Hamilton, S. A Quantitative Framework for Moving Target Defense Effectiveness Evaluation. In Proceedings of the Second ACM Workshop on Moving Target Defense, MTD ’15. New York, NY, USA, 2015; pp. 3–10. [Google Scholar]
- Zhuang, R.; DeLoach, S.A.; Ou, X. A model for analyzing the effect of moving target defenses on enterprise networks. In Proceedings of the Proc. of the 9th Annual Cyber and Information Security Research Conference. ACM, 2014, pp. 73–76.
- Dishington, C.; Sharma, D.P.; Kim, D.S.; Cho, J.H.; Moore, T.J.; Nelson, F.F. Security and performance assessment of ip multiplexing moving target defence in software defined networks. In Proceedings of the 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE). IEEE, 2019, pp. 288–295.
- Picek, S.; Hemberg, E.; O’Reilly, U.M. If you can’t measure it, you can’t improve it: Moving target defense metrics. In Proceedings of the Proceedings of the 2017 Workshop on Moving Target Defense, 2017, pp. 115–118.
- Osei, A.B.; Yeginati, S.R.; Al Mtawa, Y.; Halabi, T. Optimized Moving Target Defense Against DDoS Attacks in IoT Networks: When to Adapt? In Proceedings of the GLOBECOM 2022 - 2022 IEEE Global Communications Conference; 2022; pp. 2782–2787. [Google Scholar] [CrossRef]
- Carroll, T.E.; Crouse, M.; Fulp, E.W.; Berenhaut, K.S. Analysis of network address shuffling as a moving target defense. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), June 2014, pp. 701–706.
- Hong, J.B.; Enoch, S.Y.; Kim, D.S.; Nhlabatsi, A.; Fetais, N.; Khan, K.M. Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Computers & Security 2018, 79, 33–52. [Google Scholar]
- Zhuang, R.; DeLoach, S.A.; Ou, X. Towards a Theory of Moving Target Defense. In Proceedings of the Proc. of the First ACM Workshop on Moving Target Defense, 2014, pp. 31–40.
- Ma, D.; Wang, L.; Lei, C.; Xu, Z.; Zhang, H.; Li, M. POSTER: Quantitative Security Assessment Method Based on Entropy for Moving Target Defense. In Proceedings of the Proc. of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017, pp. 920–922.
- Steinberger, J.; Kuhnert, B.; Dietz, C.; Ball, L.; Sperotto, A.; Baier, H.; Pras, A.; Dreo, G. DDoS Defense using MTD and SDN. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium, 2018, pp. 1–9.
- https://www.cvedetails.com/.
- Lyon, G.F. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning; Insecure: USA, 2009. [Google Scholar]
- Nessus. Nessus Professional, 2018. https://www.tenable.com/products/nessus/nessus-professional.
- Sheyner, O.; Haines, J.; Jha, S.; Lippmann, R.; Wing, J.M. Automated generation and analysis of attack graphs. In Proceedings of the Security and privacy, 2002. Proceedings. 2002 IEEE Symposium on. IEEE, 2002, pp. 273–284.
- Idika, N.; Bhargava, B. Extending Attack Graph-Based Security Metrics and Aggregating Their Application. IEEE Transactions on Dependable and Secure Computing 2012, 9, 75–85. [Google Scholar] [CrossRef]
- Byres, E.; Leversage, D. Estimating a System’s Mean Time-to-Compromise. IEEE Security & Privacy 2008, 6, 52–60. [Google Scholar]
- McQueen, M.A.; Boyer, W.F.; Flynn, M.A.; Beitel, G.A. Time-to-Compromise Model for Cyber Risk Reduction Estimation. In Proceedings of the Quality of Protection; Gollmann, D.; Massacci, F.; Yautsiukhin, A., Eds., Boston, MA, 2006; pp. 49–64.
- NIST-NVD. National Vulnerability Database (NVD), 2025. https://nvd.nist.gov/, Accessed on 2025-03-01.





| Device type | Brand/Model | CVE ID | CVSS score | Description |
|---|---|---|---|---|
| Smart TV | LG WebOS | CVE-2023-6317 | 9.8 | Remote command execution |
| Smart door lock | Suleve 5-in-1 Smart Door Lock v1.0 | CVE-2023-39843 | 2.4 | Missing encryption |
| Smart speaker | Sonos Era 100 | CVE-2024-5269 | 8.8 | Use-after-free remote code execution |
| Smartphone | Android Devices | CVE-2023-40088 | 8.8 | Memory corruption |
| Security Camera | Wyze Cam | CVE-2019-9564 | 9.8 | Bypass login and control the devices |
| Smart Meter | Siemens 7KT PAC1200 | CVE-2017-9944 | 8.8 | Authentication bypass |
| Smart Thermostat | Ecobee3 lite | CVE-2021-27954 | 8.5 | Buffer-overflow |
| Smart Plug | WSP080 v1.2 lite | CVE-2023-33768 | 6.5 | Incorrect signature verification |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).