2022
DOI: 10.1109/tii.2021.3090719
|View full text |Cite
|
Sign up to set email alerts
|

Toward Proactive and Efficient DDoS Mitigation in IIoT Systems: A Moving Target Defense Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 36 publications
0
3
0
Order By: Relevance
“…By flexibly deploying potential targets and dynamically changing system configurations, the MTD method can create cognitive barriers for attackers, increasing the difficulty of launching attacks or reducing attack effectiveness. This architecture is often effective, especially for zero-day attacks and advanced persistent threats (APTs) [42]. However, the cost of hardware and software deployment and target migration is usually high, requiring special security design.…”
Section: A Analysis Of Existing Ddos Defense Architecturesmentioning
confidence: 99%
“…By flexibly deploying potential targets and dynamically changing system configurations, the MTD method can create cognitive barriers for attackers, increasing the difficulty of launching attacks or reducing attack effectiveness. This architecture is often effective, especially for zero-day attacks and advanced persistent threats (APTs) [42]. However, the cost of hardware and software deployment and target migration is usually high, requiring special security design.…”
Section: A Analysis Of Existing Ddos Defense Architecturesmentioning
confidence: 99%
“…The analyzed references considering Markov modelling for assessing the availability and cybersecurity of cloud and IoT systems can be divided into three groups: the references related to assessing availability and reliability [11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27], the references related to assessing cybersecurity [28][29][30][31][32][33][34][35][36][37][38][39], and references related to assessing both availability and cybersecurity as attributes of dependability of cloud and IoT systems [40][41][42][43].…”
Section: State Of the Artmentioning
confidence: 99%
“…The analysis results were utilized for facilitating a method to provide dependability assurance evidence for the Reactive Architecture. A multistage optimization problem of moving target defense mechanisms deployment was modelled in [26] as constrained by Markov decision processes. This modelling allowed maximizing the available resources of an intelligent system under the limitations of industrial Internet of Things environments.…”
Section: State Of the Artmentioning
confidence: 99%