Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense

作者: Jin-Hee Cho , Dilli P. Sharma , Hooman Alavizadeh , Seunghyun Yoon , Noam Ben-Asher

DOI: 10.1109/COMST.2019.2963791

关键词: Evaluation methodsComputer securityDesign elements and principlesMoving target defenseIntrusion detection systemAttack surfaceComputer science

摘要: Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. However, the nature of …

参考文章(171)
Richard Skowyra, Kevin Bauer, Veer Dedhia, Hamed Okhravi, None, Have No PHEAR: Networks Without Identifiers Proceedings of the 2016 ACM Workshop on Moving Target Defense. pp. 3- 14 ,(2016) , 10.1145/2995272.2995276
Stefan Achleitner, Thomas La Porta, Patrick McDaniel, Shridatt Sugrim, Srikanth V. Krishnamurthy, Ritu Chadha, Cyber Deception: Virtual Networks to Defend Insider Reconnaissance computer and communications security. pp. 57- 68 ,(2016) , 10.1145/2995959.2995962
Nicholas Anderson, Robert Mitchell, Ing-Ray Chen, Parameterizing Moving Target Defenses new technologies mobility and security. pp. 1- 6 ,(2016) , 10.1109/NTMS.2016.7792466
Abdullah Aydeger, Nico Saputro, Kemal Akkaya, Mohammed Rahman, None, Mitigating Crossfire Attacks Using SDN-Based Moving Target Defense 2016 IEEE 41st Conference on Local Computer Networks (LCN). pp. 627- 630 ,(2016) , 10.1109/LCN.2016.108
L. S. Shapley, Stochastic Games Proceedings of the National Academy of Sciences of the United States of America. ,vol. 39, pp. 1095- 1100 ,(1953) , 10.1073/PNAS.39.10.1095
Mengmeng Ge, Jin B. Hong, Walter Guttmann, Dong Seong Kim, A framework for automating security analysis of the internet of things Journal of Network and Computer Applications. ,vol. 83, pp. 12- 27 ,(2017) , 10.1016/J.JNCA.2017.01.033
Mujahid Mohsin, Zahid Anwar, Where to Kill the Cyber Kill-Chain: An Ontology-Driven Framework for IoT Security Analytics frontiers of information technology. pp. 23- 28 ,(2016) , 10.1109/FIT.2016.013
Simon Enoch Yusuf, Mengmeng Ge, Jin B. Hong, Huy Kang Kim, Paul Kim, Dong Seong Kim, Security Modelling and Analysis of Dynamic Enterprise Networks computer and information technology. pp. 249- 256 ,(2016) , 10.1109/CIT.2016.88
Abdulmalik Humayed, Bo Luo, Using ID-Hopping to Defend Against Targeted DoS on CAN Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles. pp. 19- 26 ,(2017) , 10.1145/3055378.3055382