Moving target defense techniques: A survey

C Lei, HQ Zhang, JL Tan, YC Zhang… - Security and …, 2018 - Wiley Online Library
As an active defense technique to change asymmetry in cyberattack‐defense confrontation,
moving target defense research has become one of the hot spots. In order to gain better …

A systematic survey of self-protecting software systems

E Yuan, N Esfahani, S Malek - ACM Transactions on Autonomous and …, 2014 - dl.acm.org
Self-protecting software systems are a class of autonomic systems capable of detecting and
mitigating security threats at runtime. They are growing in importance, as the stovepipe static …

Architecture-based self-protecting software systems

E Yuan, S Malek, B Schmerl, D Garlan… - Proceedings of the 9th …, 2013 - dl.acm.org
Since conventional software security approaches are often manually developed and
statically deployed, they are no longer sufficient against today's sophisticated and evolving …

Multi-agent reinforcement learning for intrusion detection

A Servin, D Kudenko - European Symposium on Adaptive Agents and …, 2005 - Springer
Abstract Intrusion Detection Systems (IDS) have been investigated for many years and the
field has matured. Nevertheless, there are still important challenges, eg, how an IDS can …

Architecture-based self-protection: composing and reasoning about denial-of-service mitigations

B Schmerl, J Cámara, J Gennari, D Garlan… - Proceedings of the …, 2014 - dl.acm.org
Security features are often hardwired into software applications, making it difficult to adapt
security responses to reflect changes in runtime context and new attacks. In prior work, we …

Autonomous agents and multi–agent systems (AAMAS) for the military–issues and challenges

P Beautement, D Allsopp, M Greaves… - … Workshop on Defence …, 2005 - Springer
The military domain is a very challenging environment and human endeavour in this domain
is characterized by uncertainty and the need to be able to deal with significant and disruptive …

Research on trustworthy networks.

C Lin, X Peng - Jisuanji Xuebao(Chin. J. Comput.), 2005 - cjc.ict.ac.cn
Background As networks have grown in size and complexity, the existing isolated and add-
on secure systems of internet are confronting some serious challenges, with frequent …

[หนังสือ][B] Information assurance: dependability and security in networked systems

Y Qian, D Tipper, P Krishnamurthy, J Joshi - 2010 - books.google.com
In today's fast paced, infocentric environment, professionals increasingly rely on networked
information technology to do business. Unfortunately, with the advent of such technology …

Multi-agent framework for simulation of adaptive cooperative defense against internet attacks

I Kotenko, A Ulanov - Autonomous Intelligent Systems: Multi-Agents and …, 2007 - Springer
The paper proposes the framework for investigation of prospective adaptive and cooperative
defense mechanisms against the Internet attacks. The approach suggested is based on the …

Closing cluster attack windows through server redundancy and rotations

Y Huang, D Arsenault, A Sood - Sixth IEEE International …, 2006 - ieeexplore.ieee.org
It is well-understood that increasing redundancy in a system generally improves the
availability and dependability of the system. In server clusters, one important form of …