Research and development of moving target defense technology

被引:0
|
作者
Cai G. [1 ,2 ]
Wang B. [1 ]
Wang T. [1 ]
Luo Y. [1 ]
Wang X. [1 ]
Cui X. [2 ]
机构
[1] College of Computer, National University of Defense Technology, Changsha
[2] Crop 95942, Wuhan
关键词
Attack surface; Dynamic shifting; Moving target defense; Resiliency; Security;
D O I
10.7544/issn1000-1239.2016.20150225
中图分类号
学科分类号
摘要
Nowadays, network configurations are typically deterministic, static, and homogeneous. These features reduce the difficulties for cyber attackers scanning the network to identify specific targets and gather essential information, which gives the attackers asymmetric advantages of building up, launching and spreading attacks. Thus the defenders are always at a passive position, and the existing defense mechanisms and approaches cannot reverse this situation. Moving target defense (MTD) is proposed as a new revolutionary technology to alter the asymmetric situation of attacks and defenses. It keeps moving the attack surface of the protected target through dynamic shifting, which can be controlled and managed by the administrator. In this way, the attack surface exposed to attackers appears chaotic and changes over time. Therefore, the work effort, i.e., the cost and complexity, for the attackers to launch a successful attack, will be greatly increased. As a result, the probability of successful attacks will be decreased, and the resiliency and security of the protected target will be enhanced effectively. In this paper, we firstly introduce the basic concepts of MTD, and classify the related works into categories according to their research field. Then, under each category, we give a detailed description on the existing work, and analyze and summarize them separately. Finally, we present our understandings on MTD, and summarize the current research status, and further discuss the development trends in this field. © 2016, Science Press. All right reserved.
引用
收藏
页码:968 / 987
页数:19
相关论文
共 99 条
  • [1] Wikipedia, PRISM
  • [2] Synosys, The heartbleed bug
  • [3] Liu Y., Peng W., Su J., A study of IP prefix hijacking in cloud computing networks, Security and Communication Networks, 7, 11, pp. 2201-2210, (2014)
  • [4] Zhang J., Hu H., Liu B., Robustness of RED in mitigating LDoS attack, KSII Trans on Internet and Information Systems (TIIS), 5, 5, pp. 1085-1100, (2011)
  • [5] Nitrd, Cybersecurity game-change research & development recommendations
  • [6] Executive Office of the President, Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program
  • [7] Jajodia S., Ghosh A.K., Swarup V., Et al., Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, (2011)
  • [8] Zhuang R., Zhang S., Deloach S.A., Et al., Simulation-based approaches to studying effectiveness of moving-target network defense, Proc of National Symp on Moving Target Research, pp. 1-12, (2012)
  • [9] Zhuang R., Zhang S., Bardas A., Et al., Investigating the application of moving target defenses to network security, Proc of the 6th Int Symp on Resilient Control Systems (ISRCS), pp. 162-169, (2013)
  • [10] Zhang X., Li Z., Overview on moving target defense technology, Communications Technology, 46, 6, pp. 111-113, (2013)