2016
DOI: 10.1007/978-981-10-2209-8_16
|View full text |Cite
|
Sign up to set email alerts
|

A Model for Evaluating and Comparing Moving Target Defense Techniques Based on Generalized Stochastic Petri Net

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 17 publications
0
6
0
1
Order By: Relevance
“…1 Network address shuffling has been classified as two patterns: hopping and mutation. 19 In the hopping pattern, both clients and servers are aware of the network address changing. On the contrary, in the mutation pattern, only the server side is aware.…”
Section: Ip Shuffling As Mtdmentioning
confidence: 99%
“…1 Network address shuffling has been classified as two patterns: hopping and mutation. 19 In the hopping pattern, both clients and servers are aware of the network address changing. On the contrary, in the mutation pattern, only the server side is aware.…”
Section: Ip Shuffling As Mtdmentioning
confidence: 99%
“…They analyzed the availability of MTD under different system parameters such as software age rate and different workloads. Cai et al [26] also used SRN models for evaluating the effectiveness of MTD. However, those works only focused on the effectiveness of MTD but ignored the job performance in the protected system.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, we choose GSPN as the modeling tool. The places correspond to the system state in the process of attack, defense and service, and the transitions correspond to the actions in the process of attack, defense and service [26] . 3.…”
Section: Description Of the Overall Architecture Of Mimic Dns Servicementioning
confidence: 99%
“…Guilin Cai, et al [25] develops a generalized abstract performance evaluation model for Moving target defense using Generalized stochastic petri net (GSPN). Thomas M. Chen, et al [26] propose a novel hierarchical method to construct large Petri nets from a number of smaller Petri nets that can be created separately by different domain experts, and it represents the actions of simultaneous attackers more flexible and expressive than traditional attack trees. However, the above models do not give the overall characteristics of attack disturbance, defense and service.…”
Section: Introductionmentioning
confidence: 99%