Active cyber defenses based on temporal platform diversity have been proposed as way to make systems more resistant to attacks. These defenses change the properties of the plat-forms in order to make attacks more complicated. Unfortu-nately, little work has been done on measuring the effective-ness of these defenses. In this work, we use four different approaches to quantitatively analyze these defenses; an ab-stract analysis studies the algebraic models of a temporal platform diversity system; a set of experiments on a test bed measures the metrics of interest for the system; a game theoretic analysis studies the impact of preferential selection of platforms and derives an optimal strategy; finally, a set of simulations evaluates the metri...
Cyber-physical systems (CPS) consist of cyber and physical components linked together which are inte...
With a long history of compromising Internet security, Dis-tributed Denial-of-Service (DDoS) attacks...
As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network ...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
Critical infrastructures rely on cyber and physical components that are both subject to natural, inc...
Part 7: Risk Analysis and Security MetricsInternational audienceGame theory has been researched exte...
Although many have recognized that software monocultures are a major impediment to improving securit...
An effective defense-in-depth avoids a large percentage of threats and defeats those threats that tu...
Game theory has been researched extensively in network security demonstrating an advantage of modeli...
Thesis (Ph.D.)--University of Washington, 2016-08Cyber systems form the backbone of our society, ser...
This paper presents a game-theoretic model, which analyzes Moving-Target Defense in Cyber-Physical S...
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging ...
Moving Target Defense (MTD) can enhance the resilience of cyber systems against attacks. Although th...
While there are significant advances in information technology and infrastructure which offer new op...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Cyber-physical systems (CPS) consist of cyber and physical components linked together which are inte...
With a long history of compromising Internet security, Dis-tributed Denial-of-Service (DDoS) attacks...
As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network ...
Cyber-attacks targeting individuals and enterprises have become a predominant part of the computer/i...
Critical infrastructures rely on cyber and physical components that are both subject to natural, inc...
Part 7: Risk Analysis and Security MetricsInternational audienceGame theory has been researched exte...
Although many have recognized that software monocultures are a major impediment to improving securit...
An effective defense-in-depth avoids a large percentage of threats and defeats those threats that tu...
Game theory has been researched extensively in network security demonstrating an advantage of modeli...
Thesis (Ph.D.)--University of Washington, 2016-08Cyber systems form the backbone of our society, ser...
This paper presents a game-theoretic model, which analyzes Moving-Target Defense in Cyber-Physical S...
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging ...
Moving Target Defense (MTD) can enhance the resilience of cyber systems against attacks. Although th...
While there are significant advances in information technology and infrastructure which offer new op...
Most of the cybersecurity research focus on either presenting a specific vulnerability %or hacking t...
Cyber-physical systems (CPS) consist of cyber and physical components linked together which are inte...
With a long history of compromising Internet security, Dis-tributed Denial-of-Service (DDoS) attacks...
As Internet has become ubiquitous, the risk posed by network attacks has greatly increased. Network ...