Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop 2013
DOI: 10.1145/2459976.2460045
|View full text |Cite
|
Sign up to set email alerts
|

Moving target defense (MTD) in an adaptive execution environment

Abstract: This paper describes how adaptation support facilitated by an execution environment can be used to implement moving target defenses (MTD). Reactive and proactive use of adaptation, although beneficial for cyber defense, comes with additional cost, and therefore needs to be employed selectively. We also describe the pros and cons of using reactive and proactive adaptation for MTD for a representative sample of adaptations supported by an execution environment that we are developing.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Finally, system security is enhanced by collaboratively adopting mechanisms such as endpoint information hopping, network intrusion detection, and container separation. Pal et al [100][101][102] proposed Advanced Adaptive Application (A3). A3 achieves proactive defense by adopting dedicated isolation container, defensive buffer, and modify and replay.…”
Section: Cross-layer Mtd Mechanismmentioning
confidence: 99%
“…Finally, system security is enhanced by collaboratively adopting mechanisms such as endpoint information hopping, network intrusion detection, and container separation. Pal et al [100][101][102] proposed Advanced Adaptive Application (A3). A3 achieves proactive defense by adopting dedicated isolation container, defensive buffer, and modify and replay.…”
Section: Cross-layer Mtd Mechanismmentioning
confidence: 99%
“…As described, the kernel of the algorithm is the EMD problem (4a), (4b), (4c), (4d), (4e), and (4f) solved using the binary branch and bound/cut method in Step (11). The optimal solution for (4a), (4b), (4c), (4d), (4e), and (4f) is used to update , or, in other words, to find the detours of the routes, as depicted in Step (12). By repeating these steps, the existing routes gradually move away and increase lengths, until the uniformity of all the nodes as regards accumulative traffic cannot be further improved; see the loop from Steps (2) to (13).…”
Section: Nodewise Route Mutation For Delay-tolerant Trafficmentioning
confidence: 99%
“…At the same time one can observe the significant increase in a number of research papers in this field within the last couple of years. There were proposed such solutions as defense of networks from remote scanning [4,5], defense from DDoS-attacks [6], virtualization technologies protected from research [7], etc. Some solutions based on MTD were accepted as standards in the area of software development, e.g.…”
Section: Introductionmentioning
confidence: 99%