2023
DOI: 10.1109/tifs.2023.3318964
|View full text |Cite
|
Sign up to set email alerts
|

DOLOS: A Novel Architecture for Moving Target Defense

Giulio Pagnotta,
Fabio De Gaspari,
Dorjan Hitaj
et al.

Abstract: Moving Target Defense and Cyber Deception emerged in recent years as two key proactive cyber defense approaches, contrasting with the static nature of the traditional reactive cyber defense. The key insight behind these approaches is to impose an asymmetric disadvantage for the attacker by using deception and randomization techniques to create a dynamic attack surface. Moving Target Defense (MTD) typically relies on system randomization and diversification, while Cyber Deception is based on decoy nodes and fak… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 60 publications
0
1
0
Order By: Relevance
“…Deep Learning is the key factor for an increased interest in research and development in the area of Artificial Intelligence (AI), resulting in a surge of ML based applications that are reshaping entire fields and seedling new ones. Variations of DNNs, the algorithms residing at the core of DL, have successfully been implemented in a plethora of domains, including here, but not limited to, image classification [8], [24], [61], natural language processing [6], [17], speech recognition [12], [22], data (image, text, audio) generation [4], [27], [32], [52], cyber-security [13], [28], [51], [54].…”
Section: Background a Deep Neural Networkmentioning
confidence: 99%
“…Deep Learning is the key factor for an increased interest in research and development in the area of Artificial Intelligence (AI), resulting in a surge of ML based applications that are reshaping entire fields and seedling new ones. Variations of DNNs, the algorithms residing at the core of DL, have successfully been implemented in a plethora of domains, including here, but not limited to, image classification [8], [24], [61], natural language processing [6], [17], speech recognition [12], [22], data (image, text, audio) generation [4], [27], [32], [52], cyber-security [13], [28], [51], [54].…”
Section: Background a Deep Neural Networkmentioning
confidence: 99%