For moving target defense (MTD) to shift advantage away from cyber attackers, we need techniques which render systems unpredictable but still manageable. We formulate a partially observable Markov decision process (POMDP) which facilitates optimized MTD capable of thwarting cyber attacks without excess overhead. This paper describes POMDP formulation including the use of an absorbing final state and attack penalty scaling factor to abstract defender-defined priorities into the model. An autonomous agent leverages the POMDP to select the optimal defense based on assessed cyber-attack phase. We offer an example formulation wherein attack suppression of greater than 99% and system availability of greater than 94% were maintained even as probab...
Abstract. The concept of active cyber defense has appeared in the literature in recent years. Howeve...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...
The threats posed by evolving cyberattacks have led to increased research related to software system...
For moving target defense (MTD) to shift advantage away from cyber attackers, we need techniques whi...
Moving target defense (MTD) is a promising strategy for gaining advantage over cyber attackers, but ...
Those who defend systems against cyber-attacks can use moving target defense (MTD) to their advantag...
This paper introduces an extension of the target surveillance problem in which the surveillance agen...
The expansion of information technology infrastructure is encountered with Advanced Persistent Threa...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework ...
Moving Target Defense (MTD) can enhance the resilience of cyber systems against attacks. Although th...
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to...
Moving Target Defense (MTD) presents dynamically changing attack surfaces and system configurations ...
Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communicat...
Cyber-Physical Systems (CPS) have traditionally been considered more static with more regular commun...
Abstract. The concept of active cyber defense has appeared in the literature in recent years. Howeve...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...
The threats posed by evolving cyberattacks have led to increased research related to software system...
For moving target defense (MTD) to shift advantage away from cyber attackers, we need techniques whi...
Moving target defense (MTD) is a promising strategy for gaining advantage over cyber attackers, but ...
Those who defend systems against cyber-attacks can use moving target defense (MTD) to their advantag...
This paper introduces an extension of the target surveillance problem in which the surveillance agen...
The expansion of information technology infrastructure is encountered with Advanced Persistent Threa...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework ...
Moving Target Defense (MTD) can enhance the resilience of cyber systems against attacks. Although th...
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to...
Moving Target Defense (MTD) presents dynamically changing attack surfaces and system configurations ...
Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communicat...
Cyber-Physical Systems (CPS) have traditionally been considered more static with more regular commun...
Abstract. The concept of active cyber defense has appeared in the literature in recent years. Howeve...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...
The threats posed by evolving cyberattacks have led to increased research related to software system...