Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
Moving target defense: state of the art and characteristics
G Cai, B Wang, W Hu, T Wang - Frontiers of Information Technology & …, 2016 - Springer
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the
asymmetric situation between attacks and defenses in cyber-security. Numerous related …
asymmetric situation between attacks and defenses in cyber-security. Numerous related …
[HTML][HTML] Dynamic defenses in cyber security: Techniques, methods and challenges
Y Zheng, Z Li, X Xu, Q Zhao - Digital Communications and Networks, 2022 - Elsevier
Driven by the rapid development of the Internet of Things, cloud computing and other
emerging technologies, the connotation of cyberspace is constantly expanding and …
emerging technologies, the connotation of cyberspace is constantly expanding and …
A survey on the moving target defense strategies: An architectural perspective
As the complexity and the scale of networks continue to grow, the management of the
network operations and security defense has become a challenging task for network …
network operations and security defense has become a challenging task for network …
Attack graph-based moving target defense in software-defined networks
Moving target defense (MTD) has emerged as a proactive defense mechanism aiming to
thwart a potential attacker. The key underlying idea of MTD is to increase uncertainty and …
thwart a potential attacker. The key underlying idea of MTD is to increase uncertainty and …
Mimic defense: a designed‐in cybersecurity defense framework
H Hu, J Wu, Z Wang, G Cheng - IET Information Security, 2018 - Wiley Online Library
In recent years, both academia and industry in cyber security have tried to develop
innovative defense technologies, expecting that to change the rules of the game between …
innovative defense technologies, expecting that to change the rules of the game between …
Resource-aware detection and defense system against multi-type attacks in the cloud: Repeated bayesian stackelberg game
Cloud-based systems are subject to various attack types launched by Virtual Machines
(VMs) manipulated by attackers having different goals and skills. The existing detection and …
(VMs) manipulated by attackers having different goals and skills. The existing detection and …
Attack surface definitions: A systematic literature review
Abstract Context Michael Howard conceptualized the attack surface of a software system as
a metaphor for risk assessment during the development and maintenance of software. While …
a metaphor for risk assessment during the development and maintenance of software. While …
A network coding and DES based dynamic encryption scheme for moving target defense
Unlike prior efforts in cybersecurity research, a dynamic defense theory, called moving target
defense, increases the complexity and costs for attacks by effectively restricting the …
defense, increases the complexity and costs for attacks by effectively restricting the …
Frequency-minimal moving target defense using software-defined networking
With the increase of cyber attacks such as DoS, there is a need for intelligent counter-
strategies to protect critical cloud-hosted applications. The challenge for the defense is to …
strategies to protect critical cloud-hosted applications. The challenge for the defense is to …