For moving target defense (MTD) to shift advantage away from cyber attackers, we need techniques which render systems unpredictable but still manageable. We formulate a partially observable Markov decision process (POMDP) which facilitates optimized MTD capable of thwarting cyber attacks without excess overhead. This paper describes POMDP formulation including the use of an absorbing final state and attack penalty scaling factor to abstract defender-defined priorities into the model. An autonomous agent leverages the POMDP to select the optimal defense based on assessed cyber-attack phase. We offer an example formulation wherein attack suppression of greater than 99% and system availability of greater than 94% were maintained even as probab...
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-sta...
Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communicat...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...
17 USC 105 interim-entered record; under temporary embargo.For moving target defense (MTD) to shift ...
Moving target defense (MTD) is a promising strategy for gaining advantage over cyber attackers, but ...
Those who defend systems against cyber-attacks can use moving target defense (MTD) to their advantag...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework ...
The expansion of information technology infrastructure is encountered with Advanced Persistent Threa...
This paper introduces an extension of the target surveillance problem in which the surveillance agen...
The threats posed by evolving cyberattacks have led to increased research related to software system...
Moving Target Defense (MTD) presents dynamically changing attack surfaces and system configurations ...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework...
Moving Target Defense (MTD) can enhance the resilience of cyber systems against attacks. Although th...
We present a moving target defense strategy to reduce the impact of stealthy sensor attacks on feedb...
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to...
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-sta...
Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communicat...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...
17 USC 105 interim-entered record; under temporary embargo.For moving target defense (MTD) to shift ...
Moving target defense (MTD) is a promising strategy for gaining advantage over cyber attackers, but ...
Those who defend systems against cyber-attacks can use moving target defense (MTD) to their advantag...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework ...
The expansion of information technology infrastructure is encountered with Advanced Persistent Threa...
This paper introduces an extension of the target surveillance problem in which the surveillance agen...
The threats posed by evolving cyberattacks have led to increased research related to software system...
Moving Target Defense (MTD) presents dynamically changing attack surfaces and system configurations ...
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework...
Moving Target Defense (MTD) can enhance the resilience of cyber systems against attacks. Although th...
We present a moving target defense strategy to reduce the impact of stealthy sensor attacks on feedb...
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to...
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-sta...
Cyber-Physical Systems (CPS) have traditionally been considered more static, with regular communicat...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...