Proceedings of the 6th ACM Workshop on Moving Target Defense 2019
DOI: 10.1145/3338468.3356825
|View full text |Cite
|
Sign up to set email alerts
|

On the Resilience of Network-based Moving Target Defense Techniques Against Host Profiling Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…[159], [160], [161], [162], [163], [164], [165], [166], [167], [168], [169], [170] [185], [186], [187], [188], [189], [190], [191], [192], [193], [194], [195], [196], [197], [198], [199], [200] Usability, HCI, and Visualization (3 the latter two fields generally work on other data (often images or text), or focus more on sophisticated methodologies themselves (AI/ML algorithms, visualization techniques, etc.). Only a small fraction of these papers proposes NIDS and utilizes network traffic data.…”
Section: Publication Venuesmentioning
confidence: 99%
“…[159], [160], [161], [162], [163], [164], [165], [166], [167], [168], [169], [170] [185], [186], [187], [188], [189], [190], [191], [192], [193], [194], [195], [196], [197], [198], [199], [200] Usability, HCI, and Visualization (3 the latter two fields generally work on other data (often images or text), or focus more on sophisticated methodologies themselves (AI/ML algorithms, visualization techniques, etc.). Only a small fraction of these papers proposes NIDS and utilizes network traffic data.…”
Section: Publication Venuesmentioning
confidence: 99%
“…Even if one of NMTD approaches on real host identifiers, such SSCM [5] and MT6D [7], is applied, attackers can capture packets communicated between two unknown hosts. If hopping fre-Copyright c 2022 The Institute of Electronics, Information and Communication Engineers quency is low, the attackers can profile the two hosts [6]. If hopping frequency is higher than a certain value, the attackers may not exactly profile the two hosts, but they can acquire the currently active IP and port combinations of the two hosts.…”
Section: Threat Modelmentioning
confidence: 99%
“…An important distinction in NMTD is whether the changing affects the real or virtual host identifiers [6]. NMTD approaches, such as Scalable and Seamless Connection Migration (SSCM) [5] and Moving Target IPv6 Defense (MT6D) [7], perform hopping on real host identifiers.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations