2014 IEEE International Conference on Communications (ICC) 2014
DOI: 10.1109/icc.2014.6883418
|View full text |Cite
|
Sign up to set email alerts
|

A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
37
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 55 publications
(37 citation statements)
references
References 10 publications
0
37
0
Order By: Relevance
“…Main Attacks: The common attacks considered in the existing cloud-based MTD approaches are DDoS [82], VM colocation attacks based on side channel attacks that can leak out private information of users [165], eavesdropping and message forgery / modification / dropping [41], VM probing attacks [120], database / script / mainstream hackers [132], or exploitation / data exfiltration attacks [25]. Since cloud-based web services may deal with a large volume of users' private information, it is noticeable that attacks leaking out the private information is also one of key concerns MTD needs to counteract.…”
Section: Mtd Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…Main Attacks: The common attacks considered in the existing cloud-based MTD approaches are DDoS [82], VM colocation attacks based on side channel attacks that can leak out private information of users [165], eavesdropping and message forgery / modification / dropping [41], VM probing attacks [120], database / script / mainstream hackers [132], or exploitation / data exfiltration attacks [25]. Since cloud-based web services may deal with a large volume of users' private information, it is noticeable that attacks leaking out the private information is also one of key concerns MTD needs to counteract.…”
Section: Mtd Techniquesmentioning
confidence: 99%
“…Danev et al [41] proposed a key structure to allow secure migration of virtual Trusted Platform Modules (vTPMs) in private clouds. Peng et al [120] formulated a service security model in clouds that can allow optimal configurations of VM migration / snapshotting and diversity / compatibility of migration. Sengupta et al [132] adopted a repeated Bayesian Stackelberg game to model a web-application stack shuffling MTD.…”
Section: Mtd Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…RELATED WORK MTD based works are gaining momentum in tackling cloud based threats and among them [7][8][9][10][11] are notable. In [7], authors propose a shuffling technique of static IP addresses of attacked VMs.…”
Section: Introductionmentioning
confidence: 99%
“…Authors in [8] propose a scheme to move around proxy servers to an application server in order to thwart attacks. Another notable work that applies MTD against cyber attacks on VMs is [9] where authors proactively copy the same service into multiple VMs with the consumers redirected to new VM whenever the current VMs running the critical application are attacked. In [10], the authors propose a MTD strategy to marginalize the attackers within a small pool of decoy VMs.…”
Section: Introductionmentioning
confidence: 99%