MILCOM 2015 - 2015 IEEE Military Communications Conference 2015
DOI: 10.1109/milcom.2015.7357570
|View full text |Cite
|
Sign up to set email alerts
|

Operational cost of deploying Moving Target Defenses defensive work factors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
3
1

Relationship

1
9

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…The result shows that different mechanisms in different layer can resist different phase in cyber kill-chain. What is more, in order to measure the operational cost of MTD implementation, literature [109] designed application performance monitoring (APM) and network performance monitoring (NPM). By adopting APM and NPM, the operational costs of MTD are mainly analyzed from the aspects of operating expenses, the use rate of network or endpoint node resource, and the overhead change with the change in network size.…”
Section: Research Of Effectiveness Evaluation Methods Mtd Performancementioning
confidence: 99%
“…The result shows that different mechanisms in different layer can resist different phase in cyber kill-chain. What is more, in order to measure the operational cost of MTD implementation, literature [109] designed application performance monitoring (APM) and network performance monitoring (NPM). By adopting APM and NPM, the operational costs of MTD are mainly analyzed from the aspects of operating expenses, the use rate of network or endpoint node resource, and the overhead change with the change in network size.…”
Section: Research Of Effectiveness Evaluation Methods Mtd Performancementioning
confidence: 99%
“…To assess the efficacy of our network randomization approaches, we leveraged research done by Van Leeuwen, et al [15] regarding the development of defensive work factors for MTDs. The experimental setup consisted of a highlyinstrumented testbed using virtual machines running the three different randomization techniques.…”
Section: Experiments Set Up and Resultsmentioning
confidence: 99%
“…However, it might be challenging to find the optimal balance of security and performance when relying on a single countermeasure. Moreover, since vIPs are assigned to each service, multiple vIPs are assigned to servers running multiple services, which will make it difficult to monitor for the already deployed mechanisms [13].…”
Section: Related Workmentioning
confidence: 99%