Review of moving target defense: An analysis of vulnerability and applications in new scenarios

被引:0
|
作者
Yao Q. [1 ,2 ]
Xiong X.-L. [1 ,2 ]
Wang Y.-J. [1 ,2 ]
Hou D.-D. [1 ,2 ]
机构
[1] College of Electronic Engineering, National University of Defense Technology, Hefei
[2] Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, National University of Defense Technology, Hefei
来源
Kongzhi yu Juece/Control and Decision | 2023年 / 38卷 / 11期
关键词
dynamic defense; moving target defense; the application in new scenarios; vulnerability;
D O I
10.13195/j.kzyjc.2022.0584
中图分类号
学科分类号
摘要
With the development of autonomous and intelligent attack technologies, the situation of cybersecurity is becoming increasingly severe, and the traditional defense system can no longer meet the current security requirements. To reverse the passive situation of the network defese, moving target defense (MTD) emerges as the time required, which increases the uncertainty, randomness, and diversity of network and system to resist the same type of attack, and greatly decreases the success rate of attack by effectively reducing its certainty, similarity, and static. At present, the vulnerability of MTD has not been systematically analyzed, and the specific application of MTD in new scenarios has not been summarized. Firstly, the background and basic theoretical knowledge of MTD are illustrated. Secondly, the research related to MTD is reviewed and the vulnerability is summarized. Then, we introduce how MTD can be applied to emerging fields such as cyber-physical systems, cloud environments, smart grids, and the defense of adversarial examples. Finally, the research prospects of MTD are analyzed. © 2023 Northeast University. All rights reserved.
引用
收藏
页码:3025 / 3038
页数:13
相关论文
共 89 条
  • [1] Nitrd C I., Cybersecurity game-change research and development recommendations, (2010)
  • [2] Wang Y J., Research on the development of dynamic defense technology, Secrecy Science and Technology, 6, pp. 9-14, (2020)
  • [3] Jajodia S, Ghosh A K, Subrahmanian V S., Moving target defense II, pp. 4-5, (2012)
  • [4] Zhou Y Y, Cheng G, Guo C S, Et al., Survey on attack surface dynamic transfer technology based on moving target defense, Journal of Software, 29, 9, pp. 2799-2820, (2018)
  • [5] Cai G L, Wang B S, Wang T Z, Et al., Research and development of moving target defense technology, Journal of Computer Research and Development, 53, 5, pp. 968-987, (2016)
  • [6] Fan L N, Ma Y F, Huang H, Et al., The research summary of moving target defense technology, Journal of China Academy of Electronics and Information Technology, 12, 2, pp. 209-214, (2017)
  • [7] Cybersecurity progress after president obama’s address, (2012)
  • [8] Sengupta S, Chowdhary A, Sabur A, Et al., A survey of moving target defenses for network security, IEEE Communications Surveys & Tutorials, 22, 3, pp. 1909-1941, (2020)
  • [9] Cai G L., Research on some key issues for moving target defense, (2016)
  • [10] Wu J X., Network mimicry security defense, Secrecy Science and Technology, 10, pp. 4-9, (2014)