A Cost-Based Mechanism for Evaluating the Effectiveness of Moving Target Defenses

作者: M. Patrick Collins

DOI: 10.1007/978-3-642-34266-0_13

关键词: Intelligence gatheringDynamic asset allocationDistributed computingAsset (computer security)Mechanism (biology)Space (commercial competition)Computer science

摘要: We propose a means for evaluating the strength of network-based moving target defenses using general model tag switching. Tag switching breaks network into tags (labels entities on network) and assets (hosts present whose relationshps are moderated by lookup protocols, such as DNS, ARP or BGP. Lookup protocols hide relationship between assets, already used to provide dynamic asset allocation scaling defense. Our provides generalize describing within spaces defined defender then quantifies attacker’s ability manipulate space. Defenders tag/asset over time one number defenses. The impact these is quantifiable can be determine how effective different defensive postures will be.

参考文章(14)
Feifeng Zheng, Stanley P. Y. Fung, Wun-Tat Chan, Francis Y. L. Chin, Chung Keung Poon, Prudence W. H. Wong, Improved on-line broadcast scheduling with deadlines computing and combinatorics conference. pp. 320- 329 ,(2006) , 10.1007/11809678_34
Michael Collins, Payoff based IDS evaluation usenix security symposium. pp. 8- 8 ,(2009)
Spiros Antonatos, Kostas G. Anagnostakis, TAO: protecting against hitlist worms using transparent address obfuscation international conference on communications. pp. 12- 21 ,(2006) , 10.1007/11909033_2
Seungwon Shin, Guofei Gu, Conficker and beyond: a large-scale empirical study annual computer security applications conference. pp. 151- 160 ,(2010) , 10.1145/1920261.1920285
A.A. Cardenas, J.S. Baras, K. Seamon, A framework for the evaluation of intrusion detection systems ieee symposium on security and privacy. pp. 63- 77 ,(2006) , 10.1109/SP.2006.2
Jin-Yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford, An Attacker-Defender Game for Honeynets Lecture Notes in Computer Science. pp. 7- 16 ,(2009) , 10.1007/978-3-642-02882-3_2
D. Kewley, R. Fink, J. Lowry, M. Dean, Dynamic approaches to thwart adversary intelligence gathering darpa information survivability conference and exposition. ,vol. 1, pp. 176- 185 ,(2001) , 10.1109/DISCEX.2001.932214
S. Antonatos, P. Akritidis, E. P. Markatos, K. G. Anagnostakis, Defending against hitlist worms using network address space randomization workshop on rapid malcode. pp. 30- 40 ,(2005) , 10.1145/1103626.1103633
J.E. Gaffney, J.W. Ulvila, Evaluation of intrusion detectors: a decision theory approach ieee symposium on security and privacy. pp. 50- 61 ,(2001) , 10.1109/SECPRI.2001.924287
Alper Caglayan, Mike Toothaker, Dan Drapaeau, Dustin Burke, Gerry Eaton, Behavioral analysis of fast flux service networks Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research Cyber Security and Information Intelligence Challenges and Strategies - CSIIRW '09. pp. 48- ,(2009) , 10.1145/1558607.1558662