Proceedings of the First ACM Workshop on Moving Target Defense 2014
DOI: 10.1145/2663474.2663486
|View full text |Cite
|
Sign up to set email alerts
|

Comparing Different Moving Target Defense Techniques

Abstract: Moving Target Defense techniques have been proposed to increase uncertainty and apparent complexity for attackers. When more than one Moving Target Defense techniques are effective to limit opportunities of an attack, it is required to compare these techniques and select the best defense choice. In this paper, we propose a three-layer model to evaluate and compare effectiveness of different Moving Target Defenses. This model is designed as an attempt to fill a gap among existing evaluation methods and works as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
33
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 97 publications
(33 citation statements)
references
References 28 publications
(43 reference statements)
0
33
0
Order By: Relevance
“…Examples in this category include instruction set randomization [5,6], system call number randomization [19], and address space layout randomization [20]). The third MTD category is named networkbased diversification [21], such as host IP mutation and hopping, network database schema mutation, and random finger printing, with the basic defensive idea to be: randomly change network configurations without causing network service failures. The fourth MTD category is dynamic platform techniques [21], which changes platform properties or switches among different platforms to stop attacking processes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Examples in this category include instruction set randomization [5,6], system call number randomization [19], and address space layout randomization [20]). The third MTD category is named networkbased diversification [21], such as host IP mutation and hopping, network database schema mutation, and random finger printing, with the basic defensive idea to be: randomly change network configurations without causing network service failures. The fourth MTD category is dynamic platform techniques [21], which changes platform properties or switches among different platforms to stop attacking processes.…”
Section: Related Workmentioning
confidence: 99%
“…The third MTD category is named networkbased diversification [21], such as host IP mutation and hopping, network database schema mutation, and random finger printing, with the basic defensive idea to be: randomly change network configurations without causing network service failures. The fourth MTD category is dynamic platform techniques [21], which changes platform properties or switches among different platforms to stop attacking processes. Examples in this category include virtual machine rotations, serverswitching techniques, and self-cleaning techniques.…”
Section: Related Workmentioning
confidence: 99%
“…Different techniques and strategies are applied in moving target defense [7]. Some of them are discussed below:…”
Section: Moving Target Defense Strategiesmentioning
confidence: 99%
“…MTDs are built on the premise of continuously randomizing the network's configuration (e.g., cryptographic keys, network parameters, IP addresses) so as to increase the uncertainty and cost of attack on the adversary. The effective deployment of MTDs requires meeting several challenges that range from optimizing the randomization to analyzing the costs and benefits of MTDs [2]- [10].…”
Section: Introductionmentioning
confidence: 99%