The use of traditional defense mechanisms or intrusion detection systems presents a disadvantage for defenders against attackers since these mechanisms are essentially reactive. Moving target defense (MTD) has emerged as a proactive defense mechanism to reduce this disadvantage by randomly and continuously changing the attack surface of a system to confuse attackers. Although significant progress has been made recently in analyzing the security effectiveness of MTD mechanisms, critical gaps still exist, especially in maximizing security levels and estimating network reconfiguration speed for given attack power. In this paper, we propose a set of Petri Net models and use them to perform a comprehensive evaluation regarding key security metri...
Moving Target Defense (MTD) changes the attack surface of a system that confuses intruders to thwart...
Moving Target Defense (MTD) was proposed as a promising defense paradigm to introduce v...
Software-Defined Networking (SDN) dissociates the control plane from the data plane, creating a cent...
peer reviewedThe use of traditional defense mechanisms or intrusion detection systems presents a dis...
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging ...
Critical infrastructure systems continue to foster predictable communication patterns and static con...
Abstract. This chapter presents the design and initial simulation re-sults for a prototype moving-ta...
Cyber crime is a developing concern, where criminals are targeting valuable assets and critical infr...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...
The motivation behind Software-Defined Networking (SDN) is to allow services and network capabilitie...
Moving target systems can help defenders limit the utility of reconnaissance for adversaries, hinder...
Cyber attacks on distributed systems have devastating consequences. Several cybersecurity solutions ...
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to...
The static nature of many of currently used network systems has multiple practical benefits, includi...
This paper presents an analytical model for determining the effectiveness of moving target defense (...
Moving Target Defense (MTD) changes the attack surface of a system that confuses intruders to thwart...
Moving Target Defense (MTD) was proposed as a promising defense paradigm to introduce v...
Software-Defined Networking (SDN) dissociates the control plane from the data plane, creating a cent...
peer reviewedThe use of traditional defense mechanisms or intrusion detection systems presents a dis...
Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging ...
Critical infrastructure systems continue to foster predictable communication patterns and static con...
Abstract. This chapter presents the design and initial simulation re-sults for a prototype moving-ta...
Cyber crime is a developing concern, where criminals are targeting valuable assets and critical infr...
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to s...
The motivation behind Software-Defined Networking (SDN) is to allow services and network capabilitie...
Moving target systems can help defenders limit the utility of reconnaissance for adversaries, hinder...
Cyber attacks on distributed systems have devastating consequences. Several cybersecurity solutions ...
The centralized control characteristics of software-defined networks (SDNs) make them susceptible to...
The static nature of many of currently used network systems has multiple practical benefits, includi...
This paper presents an analytical model for determining the effectiveness of moving target defense (...
Moving Target Defense (MTD) changes the attack surface of a system that confuses intruders to thwart...
Moving Target Defense (MTD) was proposed as a promising defense paradigm to introduce v...
Software-Defined Networking (SDN) dissociates the control plane from the data plane, creating a cent...