2014
DOI: 10.1117/12.2050782
|View full text |Cite
|
Sign up to set email alerts
|

Toward effectiveness and agility of network security situational awareness using moving target defense (MTD)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
3
2

Relationship

1
9

Authors

Journals

citations
Cited by 18 publications
(19 citation statements)
references
References 10 publications
0
19
0
Order By: Relevance
“…• Reconnaissance (or scanning) attacks: Scanning attacks are used by attackers to gather information and intelligence about a target system before an actual attack is launched. attacks include the use of hidden proxies, IP/port shuffling and/or address mapping [13,34,51,61,82,83,88,93,142,145,158,105]. For example, Meier et al [105] proposed a novel network obfuscation approach and implemented a framework named 'NetHide' which can successfully battle against the possible attacks such as Link-Flooding Attacks (LFAs) launched by even advanced attackers.…”
Section: Attack Typesmentioning
confidence: 99%
“…• Reconnaissance (or scanning) attacks: Scanning attacks are used by attackers to gather information and intelligence about a target system before an actual attack is launched. attacks include the use of hidden proxies, IP/port shuffling and/or address mapping [13,34,51,61,82,83,88,93,142,145,158,105]. For example, Meier et al [105] proposed a novel network obfuscation approach and implemented a framework named 'NetHide' which can successfully battle against the possible attacks such as Link-Flooding Attacks (LFAs) launched by even advanced attackers.…”
Section: Attack Typesmentioning
confidence: 99%
“…This allows for the concept of MTD games related to attacker reconnaissance evasion and intelligence collection efficiency minimization to be established for the first time. Ge et al [39] have proposed incentive compatible MTD games based on communication mapping between normal users during server migration as a methodology that could be used to ensure high network service visibility and throughput for legitimate users as well as improve cyber agility [40] in terms of availability. This methodology could compose the concept of MTD operation for securing service availability and cyber agility in an architecture defined in detail for the first time.…”
Section: Game-theoretic Defensive Deception With Mtdmentioning
confidence: 99%
“…The core elements of agility include: responsiveness, versatility, flexibility, resilience, innovativeness, and adaptability [94]. An example of agility in practice is network security that provides the dynamic responsiveness and resilience to adapt to moving challenges [95]. By considering the suitability of different C2 approaches for the conduct of different types of situations, the paradigm of C2 agility can be directly linked to the situational leadership.…”
Section: C2 Agilitymentioning
confidence: 99%