Toward proactive, adaptive defense: A survey on moving target defense
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …
efforts to secure a system or network for the last several decades. However, the nature of …
A review on machine learning–based approaches for Internet traffic classification
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …
approaches have been proposed to classify Internet traffic to manage both security and …
Attack graph-based moving target defense in software-defined networks
Moving target defense (MTD) has emerged as a proactive defense mechanism aiming to
thwart a potential attacker. The key underlying idea of MTD is to increase uncertainty and …
thwart a potential attacker. The key underlying idea of MTD is to increase uncertainty and …
Toward a moving target defense for web applications
Web applications are a critical component of the security ecosystem as they are often the
front door for many companies, as such, vulnerabilities in web applications allow hackers …
front door for many companies, as such, vulnerabilities in web applications allow hackers …
[PDF][PDF] Survey of cyber moving targets second edition
This survey provides an overview of different cyber moving-target techniques, their threat
models, and their technical details. A cyber moving-target technique refers to any technique …
models, and their technical details. A cyber moving-target technique refers to any technique …
DIVERGENCE: Deep reinforcement learning-based adaptive traffic inspection and moving target defense countermeasure framework
Reinforcement learning (RL) is a promising approach for intelligent agents to protect a given
system under highly hostile environments. RL allows the agent to adaptively make …
system under highly hostile environments. RL allows the agent to adaptively make …
[PDF][PDF] Moving target defense for web applications using bayesian stackelberg games
Vulnerabilities in web applications allow hackers to access and/or modify restricted data.
Here the hackers have the opportunity to perform reconnaissance so as to gain knowledge …
Here the hackers have the opportunity to perform reconnaissance so as to gain knowledge …
Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems
Abstract Industrial Control Systems are used in a wide variety of industrial facilities, including
critical infrastructures, becoming the main target of multiple security attacks. A malicious and …
critical infrastructures, becoming the main target of multiple security attacks. A malicious and …
An optimal active defensive security framework for the container-based cloud with deep reinforcement learning
Y Li, H Hu, W Liu, X Yang - Electronics, 2023 - mdpi.com
Due to the complexity of attack scenarios in the container-based cloud environment and the
continuous changes in the state of microservices, the effectiveness of active defense …
continuous changes in the state of microservices, the effectiveness of active defense …
A survey on moving target defense: Intelligently affordable, optimized and self-adaptive
R Sun, Y Zhu, J Fei, X Chen - Applied Sciences, 2023 - mdpi.com
Represented by reactive security defense mechanisms, cyber defense possesses a static,
reactive, and deterministic nature, with overwhelmingly high costs to defend against ever …
reactive, and deterministic nature, with overwhelmingly high costs to defend against ever …