Assessing the Effectiveness of Moving Target Defenses Using Security Models

作者: Jin B. Hong , Dong Seong Kim

DOI: 10.1109/TDSC.2015.2443790

关键词:

摘要: Cyber crime is a developing concern, where criminals are targeting valuable assets and critical infrastructures within networked systems, causing severe socio-economic impact on enterprises individuals. Adopting moving target defense (MTD) helps thwart cyber attacks by continuously changing the attack surface. There numerous MTD techniques proposed in various domains (e.g., virtualized network, wireless sensor network), but there still lack of methods to assess compare effectiveness them. Security models, such as an graph (AG), provide formal method analyzing security, incorporating those security models has not been studied. In this paper, we incorporate into model, namely hierarchical representation model (HARM), addition, use importance measures (IMs) for deploying enhance scalability. Finally, scalability AG HARM when techniques, well changes performance our experiments.

参考文章(54)
David Evans, Anh Nguyen-Tuong, John Knight, Effectiveness of Moving Target Defenses Moving Target Defense. pp. 29- 48 ,(2011) , 10.1007/978-1-4614-0977-9_2
Jin Bum Hong, Dong Seong Kim, HARMs: Hierarchical Attack Representation Models for Network Security Analysis australian information security management conference. pp. 74- 81 ,(2012) , 10.4225/75/57B559A3CD8DA
Jin B. Hong, Dong Seong Kim, Performance Analysis of Scalable Attack Representation Models Security and Privacy Protection in Information Processing Systems. ,vol. 405, pp. 330- 343 ,(2013) , 10.1007/978-3-642-39218-4_25
Yulong Zhang, Min Li, Kun Bai, Meng Yu, Wanyu Zang, Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds information security conference. pp. 388- 399 ,(2012) , 10.1007/978-3-642-30436-1_32
Pratyusa K. Manadhata, Game Theoretic Approaches to Attack Surface Shifting Moving Target Defense. pp. 1- 13 ,(2013) , 10.1007/978-1-4614-5416-8_1
Jin B. Hong, Dong Seong Kim, Scalable Security Model Generation and Analysis Using k-importance Measures international conference on security and privacy in communication systems. pp. 270- 287 ,(2013) , 10.1007/978-3-319-04283-1_17
Todd Jackson, Babak Salamat, Andrei Homescu, Karthikeyan Manivannan, Gregor Wagner, Andreas Gal, Stefan Brunthaler, Christian Wimmer, Michael Franz, Compiler-Generated Software Diversity Moving Target Defense. pp. 77- 98 ,(2011) , 10.1007/978-1-4614-0977-9_4
Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel, k-zero day safety: measuring the security risk of networks against unknown attacks european symposium on research in computer security. ,vol. 6345, pp. 573- 587 ,(2010) , 10.1007/978-3-642-15497-3_35
Anatoliy Gorbenko, Vyacheslav Kharchenko, Alexander Romanovsky, Using Inherent Service Redundancy and Diversity to Ensure Web Services Dependability Methods, Models and Tools for Fault Tolerance. pp. 324- 341 ,(2009) , 10.1007/978-3-642-00867-2_15