Toward proactive, adaptive defense: A survey on moving target defense

JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …

A review on machine learning–based approaches for Internet traffic classification

O Salman, IH Elhajj, A Kayssi, A Chehab - Annals of Telecommunications, 2020 - Springer
Traffic classification acquired the interest of the Internet community early on. Different
approaches have been proposed to classify Internet traffic to manage both security and …

Attack graph-based moving target defense in software-defined networks

S Yoon, JH Cho, DS Kim, TJ Moore… - … on Network and …, 2020 - ieeexplore.ieee.org
Moving target defense (MTD) has emerged as a proactive defense mechanism aiming to
thwart a potential attacker. The key underlying idea of MTD is to increase uncertainty and …

Toward a moving target defense for web applications

M Taguinod, A Doupé, Z Zhao… - 2015 IEEE international …, 2015 - ieeexplore.ieee.org
Web applications are a critical component of the security ecosystem as they are often the
front door for many companies, as such, vulnerabilities in web applications allow hackers …

[PDF][PDF] Survey of cyber moving targets second edition

BC Ward, SR Gomez, R Skowyra, D Bigelow… - MIT Lincoln Laboratory …, 2018 - mit.edu
This survey provides an overview of different cyber moving-target techniques, their threat
models, and their technical details. A cyber moving-target technique refers to any technique …

DIVERGENCE: Deep reinforcement learning-based adaptive traffic inspection and moving target defense countermeasure framework

S Kim, S Yoon, JH Cho, DS Kim… - … on Network and …, 2022 - ieeexplore.ieee.org
Reinforcement learning (RL) is a promising approach for intelligent agents to protect a given
system under highly hostile environments. RL allows the agent to adaptively make …

[PDF][PDF] Moving target defense for web applications using bayesian stackelberg games

SG Vadlamudi, S Sengupta, M Taguinod… - Proceedings of the …, 2016 - aamas.csc.liv.ac.uk
Vulnerabilities in web applications allow hackers to access and/or modify restricted data.
Here the hackers have the opportunity to perform reconnaissance so as to gain knowledge …

Low delay network attributes randomization to proactively mitigate reconnaissance attacks in industrial control systems

X Etxezarreta, I Garitano, M Iturbe, U Zurutuza - Wireless Networks, 2024 - Springer
Abstract Industrial Control Systems are used in a wide variety of industrial facilities, including
critical infrastructures, becoming the main target of multiple security attacks. A malicious and …

An optimal active defensive security framework for the container-based cloud with deep reinforcement learning

Y Li, H Hu, W Liu, X Yang - Electronics, 2023 - mdpi.com
Due to the complexity of attack scenarios in the container-based cloud environment and the
continuous changes in the state of microservices, the effectiveness of active defense …

A survey on moving target defense: Intelligently affordable, optimized and self-adaptive

R Sun, Y Zhu, J Fei, X Chen - Applied Sciences, 2023 - mdpi.com
Represented by reactive security defense mechanisms, cyber defense possesses a static,
reactive, and deterministic nature, with overwhelmingly high costs to defend against ever …