Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014 2014
DOI: 10.1109/wowmom.2014.6918979
|View full text |Cite
|
Sign up to set email alerts
|

SDN-based solutions for Moving Target Defense network protection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
79
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 121 publications
(79 citation statements)
references
References 3 publications
0
79
0
Order By: Relevance
“…The integration of both spatial and temporal mutations could effectively defeat various reconnaissance-based threat models, ranging from naive IP sharing techniques to sophisticated advanced persistent threats. Kampanakis et al [2] demonstrated how a highly programmable SDN could offer various avenues to provide obfuscations, which increases the cost of an attack by requiring the attacker to expend more resources studying the attack surface. In addition, some researchers have proposed RRM mechanisms.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The integration of both spatial and temporal mutations could effectively defeat various reconnaissance-based threat models, ranging from naive IP sharing techniques to sophisticated advanced persistent threats. Kampanakis et al [2] demonstrated how a highly programmable SDN could offer various avenues to provide obfuscations, which increases the cost of an attack by requiring the attacker to expend more resources studying the attack surface. In addition, some researchers have proposed RRM mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…Otherwise, we should set GEN = GEN +1 (GEN represents the iteration time) and return to (2). If GEN > max GEN or the current solution has been stable, we will stop the entire process.…”
Section: Generation Of An Optimal Random Routing Pathmentioning
confidence: 99%
See 1 more Smart Citation
“…Kampanakis et al [74] advocate the use of moving target defense (MTD) in order to protect network services when malicious traffic try to compromise their integrity. The authors conclude that SDN makes the implementation of MTD techniques more practical, customizable and easier to deploy.…”
Section: Securitymentioning
confidence: 99%
“…Within the first group, there are several implementations of firewalls and IDSes that can perform their functions more flexibly and with lower management cost [70]. Within the second group, research is focused on mitigating intrusions in the control plane; vulnerabilities in the TLS protocol; and protecting the control plane against malicious attacks using network-wide policies and moving target defense [74].…”
Section: Summary Of Challenges and Current Solutionsmentioning
confidence: 99%