2017
DOI: 10.1177/1548512917699725
|View full text |Cite
|
Sign up to set email alerts
|

Cyber defense in breadth: Modeling and analysis of integrated defense systems

Abstract: Cybersecurity is one of most critical concerns for any organization, as frequency and severity of cyber attacks constantly increase, resulting in loss of vital assets and/or services. To preserve key security goals such as confidentiality, integrity, and availability, a variety of defense techniques have been introduced. While intrusion detection system (IDS) has played a key role in cybersecurity for a long time, recently new proactive defense techniques, called intrusion prevention techniques, have emerged, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
23
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(24 citation statements)
references
References 21 publications
1
23
0
Order By: Relevance
“…Evaluation Methods: As seen in Section VIII, most MTD approaches have used simulation-based experiments for the performance validation. The similar trends are observed in evaluating MTD techniques for enterprise networks , which are mainly validated based on simulation models [20,34,49,51,83,158,161] while the use of a model-based probability/analytical models was not common [30]. Fig.…”
Section: A Enterprise Networksupporting
confidence: 56%
See 1 more Smart Citation
“…Evaluation Methods: As seen in Section VIII, most MTD approaches have used simulation-based experiments for the performance validation. The similar trends are observed in evaluating MTD techniques for enterprise networks , which are mainly validated based on simulation models [20,34,49,51,83,158,161] while the use of a model-based probability/analytical models was not common [30]. Fig.…”
Section: A Enterprise Networksupporting
confidence: 56%
“…The examples include platform migrations or system diversity [20,30,46,49], server location migrations [51,158], software stack diversity [161], proxy shuffling [83], or IP mutation [34]. Main Attacks: Most MTD approaches developed for enterprise networks countermeasured worm attacks [51], DDoS [51,83,158], abstracted attacks in an attack-defense game [49], scanning attacks [20,30,34], APT attacks [161], or more sophisticated, multi-stage attacks, including circumvention attacks, deputy attacks, entropy reducing attacks, probing attacks, and incremental attacks [46]. Key Methodologies: Since majority of existing MTD approaches have used game theoretic approaches, many MTD techniques for enterprise networks have used in an attackdefense game where the MTD techniques are used as defense strategies.…”
Section: A Enterprise Networkmentioning
confidence: 99%
“…MTD is designed to increase uncertainty and/or confusion to attackers attempting to penetrate into a system by identifying vulnerabilities of the target system. The main functions of MTD are to change the attack surfaces (i.e., system or network configurations), consequently invalidating the intelligence gathered by the attackers and wasting their resources and time [17]. The MTD techniques can be categorized in terms of shuffling, diversity, and redundancy [7].…”
Section: B Moving Target Defensementioning
confidence: 99%
“…In line 8, the IP shuffling-based MTD countermeasure according to the probability in (9) for security enhancement of devices in the network. In lines 9 -12, Based on the randomly sampled mini batch from B, θ Q and θ µ are updated according to (17) and (18), and targets θ Q and θ µ are updated softly.…”
Section: Ddpg-based Resource Allocation For Traffic Inspection and Mtd Operationsmentioning
confidence: 99%
“…Rahman et al [18] combine the degree of the system vulnerability and perform an attack based on resource level to quantify the probability that attacks are successfully performed. Cho et al [19] use Stochastic Petri Nets to create a model that describes an integrated defense system. They used the probability of a successful attack to quantify the meantime to security failure.…”
Section: Related Workmentioning
confidence: 99%