2019
DOI: 10.1016/j.procs.2019.04.137
|View full text |Cite
|
Sign up to set email alerts
|

Secure Multipath Mutation SMPM in Moving Target Defense Based on SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…By now, the researchers have put more emphasis on changing static parameters of the data flow on the fly [16,17,18,19,20]. The IP address [21], the port [22], and the routing path of a flow [11,19,20,23,24,25] are the main objects of dynamic configuration.…”
Section: Related Workmentioning
confidence: 99%
“…By now, the researchers have put more emphasis on changing static parameters of the data flow on the fly [16,17,18,19,20]. The IP address [21], the port [22], and the routing path of a flow [11,19,20,23,24,25] are the main objects of dynamic configuration.…”
Section: Related Workmentioning
confidence: 99%
“…us, network defense technique transforms from "passive defense" to "proactive defense" and networkbased MTD comes into being. Existing studies on path mutation technique mainly include multipath mutation [13][14][15] and random-path mutation [16][17][18].…”
Section: Related Workmentioning
confidence: 99%
“…RRM was extended by Jafarian et al [14] via optimizing the mutation strategy based on game theory and constraint satisfaction optimization to improve the defense capability of path mutation. To enhance the mutation efficiency and increase the complexity of attacks in scanning and poisoning, Zkik et al [15] focused on modeling software defined network (SDN) architectures, where two new modules were implemented to automatically calculate the suitable paths based on a pathfinder algorithm. However, owing to the deterministic nature of these multipath mutation techniques, the adversary who has acquired the routing algorithm can calculate the mutation path and hence endangers all packets forwarded over this path.…”
Section: Multipath Mutationmentioning
confidence: 99%
See 1 more Smart Citation