2023
DOI: 10.1016/j.cosrev.2023.100544
|View full text |Cite
|
Sign up to set email alerts
|

A survey: When moving target defense meets game theory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 50 publications
0
2
0
Order By: Relevance
“…However, this approach to cybersecurity was formalized only recently under the umbrella of Moving Target Defense [1]. Since then, many approaches have been proposed in the literature at different levels of the system stack, with several review papers covering the topic [36], [37]. In this section, we analyze relevant related works and provide a comparison against DOLOS.…”
Section: Related Workmentioning
confidence: 99%
“…However, this approach to cybersecurity was formalized only recently under the umbrella of Moving Target Defense [1]. Since then, many approaches have been proposed in the literature at different levels of the system stack, with several review papers covering the topic [36], [37]. In this section, we analyze relevant related works and provide a comparison against DOLOS.…”
Section: Related Workmentioning
confidence: 99%
“…(3) Proximity centrality Proximity centrality is used to measure the average distance from one node to other nodes in the network. As shown in formula (7), where uv d represents the geodesic distance between nodes u and v, as the higher the degree of network center of the node, the lower the average geodesic distance. Therefore, the reciprocal processing is performed, and V is the node set in the network.…”
Section: Path Initial Weight Calculationmentioning
confidence: 99%
“…AI techniques, such as ML and DL, are used to enhance SDN security in various ways, including anomaly detection, traffic classification, and threat prediction [15], [16]. Moving target defense mechanisms are designed to thwart evolving cyber threats by dynamically changing network configurations [17], [18]. We focus on moving-target defense mechanisms deployed within SDN, particularly the data and control planes.…”
Section: Introductionmentioning
confidence: 99%