A cost-sensitive move selection strategy for moving target defense

V Zangeneh, M Shajari - Computers & Security, 2018 - Elsevier
The effectiveness and the cost-sensitivity of moving target defense (MTD) strategies have
not been studied thoroughly in previous research. In this paper, we propose a hybrid MTD …

Quantifying the mission impact of network-level cyber defensive mitigations

N Wagner, CŞ Şahin, M Winterrose… - The Journal of …, 2017 - journals.sagepub.com
Modern missions of government and private organizations rely on computer networks to
operate. As evidenced by several well-publicized cyber breaches, these missions are under …

Overview of control and game theory in adaptive cyber defenses

G Cybenko, M Wellman, P Liu, M Zhu - Adversarial and Uncertain …, 2019 - Springer
The purpose of this chapter is to introduce cyber security researchers to key concepts in
modern control and game theory that are relevant to Moving Target Defenses and Adaptive …

[PDF][PDF] Simulating ecosystem-level cybersecurity for the future generation of critical infrastructures

X de Ronde - repository.tudelft.nl
This report encompasses the final product of many months of hard work on the master's
thesis in fulfilment of the Master of Science degree in Complex Systems Engineering and …

Simulation based evaluation of a code diversification strategy

B Tello, M Winterrose, G Baah… - … Conference on Simulation …, 2015 - scitepress.org
Periodic randomization of a computer program's binary code is an attractive technique for
defending against several classes of advanced threats. In this paper we describe a model of …

A system attack surface based MTD effectiveness and cost quantification framework

X **ong, G Zhao, X Wang - … of the 2nd International Conference on …, 2018 - dl.acm.org
Moving Target Defense (MTD) is a game-changing method to thwart adversaries and
reverses the imbalance situation in network countermeasures. Introducing Attack Surface …

راه حلی برای کاهش بار ترافیکی حملات سایبری در سامانه‌های امنیتی و دفاعی با استفاده از توزیع‌شدگی تعاملی

عباسی, کشوری, حسنی آهنگر - پدافند غیرعامل, 2018‎ - pd.ihu.ac.ir
با گسترش روزافزون فضای مجازی و ضریب نفوذ آن در سازمان‌ها، حملات سایبری بهخصوص حملات
منع خدمت به‌وسیله بدافزارها و نفوذگران افزایش ‌یافته است. با توجه به محدودیت‌هایی که نمی‌توان …

Simulation Driven Policy Recommendations for Code Diversity

B Tello, M Winterrose, G Baah, M Zhivich - Simulation and Modeling …, 2016 - Springer
Periodic randomization of a computer program's binary code is an attractive technique for
defending against several classes of advanced threats. In this paper we describe a model of …