Survey of attack projection, prediction, and forecasting in cyber security

M Husák, J Komárková, E Bou-Harb… - … Surveys & Tutorials, 2018‏ - ieeexplore.ieee.org
This paper provides a survey of prediction, and forecasting methods used in cyber security.
Four main tasks are discussed first, attack projection and intention recognition, in which …

Survey of contemporary open-source honeypots, frameworks, and tools

N Ilg, P Duplys, D Sisejkovic, M Menth - Journal of Network and Computer …, 2023‏ - Elsevier
Automated attacks allow adversaries to exploit vulnerabilities in enterprise IT systems at
short notice. To identify such attacks as well as new cyber security threats, defenders use …

ClockIDS: A real-time vehicle intrusion detection system based on clock skew

Y Zhao, Y Xun, J Liu - IEEE Internet of Things Journal, 2022‏ - ieeexplore.ieee.org
Although intelligent connected vehicles (ICVs) can better assist drivers and improve their
driving experience, they have huge network security problems and are frequently attacked …

Hidden markov model and cyber deception for the prevention of adversarial lateral movement

MAR Al Amin, S Shetty, L Njilla, DK Tosh… - IEEE …, 2021‏ - ieeexplore.ieee.org
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted
nation-states and their associated entities, including private and corporate sectors. Cyber …

A probabilistic logic of cyber deception

S Jajodia, N Park, F Pierazzi, A Pugliese… - IEEE Transactions …, 2017‏ - ieeexplore.ieee.org
Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they
may exploit as they traverse the network. In this paper, we propose that the system …

Performance modeling of moving target defenses with reconfiguration limits

W Connell, DA Menasce… - IEEE Transactions on …, 2018‏ - ieeexplore.ieee.org
Moving Target Defense (MTD) has recently emerged as a game changer in the security
landscape due to its proven potential to introduce asymmetric uncertainty that gives the …

Dolos: A novel architecture for moving target defense

G Pagnotta, F De Gaspari, D Hitaj… - IEEE Transactions …, 2023‏ - ieeexplore.ieee.org
Moving Target Defense and Cyber Deception emerged in recent years as two key proactive
cyber defense approaches, contrasting with the static nature of the traditional reactive cyber …

A survey on moving target defense for networks: A practical view

Ł Jalowski, M Zmuda, M Rawski - Electronics, 2022‏ - mdpi.com
The static nature of many of currently used network systems has multiple practical benefits,
including cost optimization and ease of deployment, but it makes them vulnerable to …

Toward the adoption of secure cyber digital twins to enhance cyber-physical systems security

A De Benedictis, C Esposito, A Somma - … on the Quality of Information and …, 2022‏ - Springer
Abstract Cyber-Physical Systems (CPSs) and Digital Twins (DTs) currently represent the two
most notable examples of cyber-physical integration enabled by modern ICT technologies …

Performance modeling of moving target defenses

W Connell, DA Menascé, M Albanese - … of the 2017 Workshop on Moving …, 2017‏ - dl.acm.org
In recent years, Moving Target Defense (MTD) has emerged as a potential game changer in
the security landscape, due to its potential to create asymmetric uncertainty that favors the …