2014
DOI: 10.1109/msp.2014.30
|View full text |Cite
|
Sign up to set email alerts
|

Moving-Target Defenses for Computer Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 57 publications
(28 citation statements)
references
References 1 publication
0
28
0
Order By: Relevance
“…For perfect port hopping, the likelihood of attack success defined by Equation (4) becomes (7) The attack success rate in this scenario is shown in Figure 2, the likelihood of attack success increases slowly as the number of probes increases, whic h is slower than that of static ports when v is fixed. Figure 2 also shows that the attack success rate increases as the number of vulnerable services increases when number of probes k is fixed, and the fewer vulnerable services a server host has, the better defense performance port hopping performs.…”
Section: Number Of Probesmentioning
confidence: 98%
See 1 more Smart Citation
“…For perfect port hopping, the likelihood of attack success defined by Equation (4) becomes (7) The attack success rate in this scenario is shown in Figure 2, the likelihood of attack success increases slowly as the number of probes increases, whic h is slower than that of static ports when v is fixed. Figure 2 also shows that the attack success rate increases as the number of vulnerable services increases when number of probes k is fixed, and the fewer vulnerable services a server host has, the better defense performance port hopping performs.…”
Section: Number Of Probesmentioning
confidence: 98%
“…In order to turn the asymmetric scale of cyber attacks and defenses, people focus their attentions on moving target defense (MTD) [6][7] technologies, such as address and port hopping, which is a novel proactive cyber defense mechanism where the defenders continuously shift their systems' attack surfaces to increase attackers' efforts in performing reconnaissance and compromising their systems [8]. MTD alters systems' network attributes in an unpredictable way, and in such a way to confuse potential attackers and render their knowledge ineffective or impractical.…”
Section: Introductionmentioning
confidence: 99%
“…Due to the static nature of a cyber system, an attacker can not only perform reconnaissance on the target cyber system (i.e., scan the attack surface of the target system for possible vulnerabilities), but also launch an attack at his chosen time point to exploit the discovered vulnerabilities [1]. The traditional strategy to defend the cyber system is to detect the unique behaviors of the attack.…”
Section: Introductionmentioning
confidence: 99%
“…Considering adversaries that can eavesdrop and launch DoS attacks to the applications' open ports, solutions based on port hopping have been proposed [15]. Port hopping is an effective moving target defense mechanism [5] that turns the asymmetric scale of network attacks and defenses, dynamically maps a service's port to an unused pseudo-random port [16], can provide a robust communication environment for clients and servers. The port hopping is designed to allow the client to access the server's services by assigning the ephemeral and synchronous random port number.…”
Section: Introductionmentioning
confidence: 99%