[HTML][HTML] Insider threat mitigation: Systematic literature review

U Inayat, M Farzan, S Mahmood, MF Zia… - Ain Shams Engineering …, 2024 - Elsevier
The increasing prevalence of cybercrime necessitates the implementation of robust security
measures. The majority of these attacks are initiated by authorized users who possess …

Machine learning for service migration: a survey

N Toumi, M Bagaa, A Ksentini - IEEE Communications Surveys …, 2023 - ieeexplore.ieee.org
Future communication networks are envisioned to satisfy increasingly granular and dynamic
requirements to accommodate the application and user demands. Indeed, novel immersive …

Event-based moving target defense in cloud computing with vm migration: A performance modeling approach

L Santos, C Brito, I Fé, J Carvalho, M Torquato… - IEEE …, 2024 - ieeexplore.ieee.org
The domain of information security is undergoing significant evolution to address the
increasingly complex challenges aimed at bolstering system resilience against attacks. The …

Secured VM deployment in the cloud: Benchmarking the enhanced simulation model

U Nauman, Y Zhang, Z Li, T Zhen - Applied Sciences, 2024 - mdpi.com
Cloud computing has gained widespread recognition for facilitating myriad online services
and applications. However, the current stages of commercial cloud computing employ a …

[HTML][HTML] Evaluation of time-based virtual machine migration as moving target defense against host-based attacks

M Torquato, P Maciel, M Vieira - Journal of Systems and Software, 2025 - Elsevier
Abstract Moving Target Defense (MTD) consists of applying dynamic reconfiguration in the
defensive side of the attack-defense cybersecurity game. Virtual Machine (VM) migration …

Software rejuvenation meets moving target defense: Modeling of time-based virtual machine migration approach

M Torquato, P Maciel, M Vieira - 2022 IEEE 33rd International …, 2022 - ieeexplore.ieee.org
The use of Virtual Machine (VM) migration as support for software rejuvenation was
introduced more than a decade ago. Since then, several works have validated this approach …

An SRN-based model for assessing co-resident attack mitigation in cloud with VM migration and allocation policies

X Yang, A Smahi, H Li, H Zhang… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Cloud computing provides users with cost-effective on-demand resource sharing, but the
shared resources also creates additional security risks due to co-location with malicious …

A review of methods to prevent DDOS attacks using NFV and SDN

MJ Shayegan, A Damghanian - 2023 9th International …, 2023 - ieeexplore.ieee.org
Denial-of-service attacks are always one of the most widespread security attacks at the
enterprise network level. In DDOS attacks, a large amount of false demand is intentionally …

Security modeling and analysis of moving target defense in software defined networks

J Mendonça, M Kim, R Graczyk… - 2022 IEEE 27th Pacific …, 2022 - ieeexplore.ieee.org
The use of traditional defense mechanisms or intrusion detection systems presents a
disadvantage for defenders against attackers since these mechanisms are essentially …

Can Migration-based Dynamic Platform Technique Work Effectively: A Quantitative Analysis Perspective

W Zhu, Y Yang, Y Zhang, X Chang - IEEE Access, 2024 - ieeexplore.ieee.org
Migration-based Dynamic Platform (MdyPlat) is a type of Moving Target Defense (MTD)
techniques to protect the task executed on the platform. MdyPlat actively hinders …