ICC 2019 - 2019 IEEE International Conference on Communications (ICC) 2019
DOI: 10.1109/icc.2019.8761927
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(11 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…The paper [83] proposed an MTD framework for spatiotemporal route mutation by using a stochastic optimization model to provide network security. The system is supervised by a controller that disperses the traffic among nodes taking into account parameters like link capacity, predetermined network and user requirements, and node stability, but also overall user quality of experience (QoE).…”
Section: Route Mutationmentioning
confidence: 99%
See 2 more Smart Citations
“…The paper [83] proposed an MTD framework for spatiotemporal route mutation by using a stochastic optimization model to provide network security. The system is supervised by a controller that disperses the traffic among nodes taking into account parameters like link capacity, predetermined network and user requirements, and node stability, but also overall user quality of experience (QoE).…”
Section: Route Mutationmentioning
confidence: 99%
“…However, different approaches are also present in research papers, such as [93,110], which proposed an architecture, deriving new values from the pre-shared key between host and server. Articles [77,83,102,104,114] proposed calculating new values based on the current state of the system, possibly also taking past events into consideration. This could include network parameters, such as current link congestion, storage space, or even how many times a node had been under attack in the past.…”
Section: How To Movementioning
confidence: 99%
See 1 more Smart Citation
“…Constraint (13) ensures that any link which is used in the prior control sublayer (developed by the proposed algorithm) will not be used in the new sublayer graph. Constraint (14) ensures that all the high-risk, recently compromised communication links (known based on the history of the underlying interconnected MAS) will be excluded from the control layer. Constraint (15) ensures that any node without an active selfloop will be connected to a node with an active selfloop (either directly or via an intermediary node).…”
Section: Control Layer Design Framework: Cybersecuritymentioning
confidence: 99%
“…For instance, routing randomization has been proven to be an effective method against eavesdropping attacks. Currently, representative routing randomization techniques include but are not limited to: RRM [53], AE-RRM [50], AT-RRM [54], and SSO-RM [55]. However, RRM and AE-RRM implement random transformations only on the routes of data transmission between nodes, without considering different attack behaviors and protecting network QoS under such circumstances.…”
mentioning
confidence: 99%