Proceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation 2014
DOI: 10.1145/2598394.2605437
|View full text |Cite
|
Sign up to set email alerts
|

Evolutionary based moving target cyber defense

Abstract: A Moving Target (MT) defense constantly changes a system's attack surface, in an attempt to limit the usefulness of the reconnaissance the attacker has collected. One approach to this defense strategy is to intermittently change a system's configuration. These changes must maintain functionality and security, while also being diverse. Finding suitable configuration changes that form a MT defense is challenging. There are potentially a large number of individual configurations' settings to consider, without a f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(25 citation statements)
references
References 11 publications
0
25
0
Order By: Relevance
“…In particular, they considered the aging aspect of configurations to reflect vulnerability that can be introduced by an aged configuration. In addition, the authors enhanced their GAbased MTD to change computer configurations by changing mutation as well as using the feedback about system security status [84]. Zhuang et al [172] also used a GA to generate system configurations with high diversity for maximizing system security.…”
Section: B Genetic Algorithm-based Mtdmentioning
confidence: 99%
“…In particular, they considered the aging aspect of configurations to reflect vulnerability that can be introduced by an aged configuration. In addition, the authors enhanced their GAbased MTD to change computer configurations by changing mutation as well as using the feedback about system security status [84]. Zhuang et al [172] also used a GA to generate system configurations with high diversity for maximizing system security.…”
Section: B Genetic Algorithm-based Mtdmentioning
confidence: 99%
“…Evolutionary game theory has also been successfully applied in the areas of Vehicular Ad hoc NETworks [30], moving target cyber defense [16], IoT service selection for balancing device energy consumption [22], trust cooperative stimulation model for large scale MANETs [37], trust strategy adjustment among nodes in wireless sensor networks [18], a co-evolutionary game theory using replicator dynamics with feedback-evolving games [39], effects of finite populations on evolutionary stable strategies [11], etc.…”
Section: Evolutionary Game For Securitymentioning
confidence: 99%
“…2) Shift machine configurations John et al proposed a machine configurations shifting method to obtain a more secure configuration [30,31]. This method firstly codes system configures into chromosomes by found component, executes genetic algorithm, produces offspring with a higher degree of security configuration, and sends the offspring population to achieve component, implementation component in a set of virtual machine to implement the offspring population, reserve grading rules and scan tool is used by assess components (such as Nessus) to evaluate on the safety of new groups.…”
Section: Dynamic Execution Environmentmentioning
confidence: 99%