Characterizing the Running Patterns of Moving Target Defense Mechanisms

被引:0
|
作者
Cai, Guilin [1 ]
Wang, Baosheng [1 ]
Luo, Yuebin [1 ]
Li, Sudan [1 ]
Wang, Xiaofeng [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
关键词
Moving Target Defense; security; fundamental running patterns; confirmation;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Moving Target Defense (MTD) has been proposed as a game-changing theme to increase the work effort to attack as well as the security of target system. There has been proposed a multitude of MTD mechanisms. Generally, these mechanisms follow some fundamental running patterns which determine their functionalities. In this paper, we introduce three main schools of thought on MTD mechanisms systematically and categorize the related works according to them. Then we identify and define three fundamental running patterns exhibited by these MTD mechanisms. Thereafter, we use five MTD mechanisms, which belong to the three schools of thought, as cases to confirm the patterns presented. This work can help the novices of this field to understand the running behaviours of MTDs better and easier, and can also give developers design guidance of new MTD system by providing insights of the running patterns.
引用
收藏
页码:191 / 196
页数:6
相关论文
共 50 条
  • [21] Implementation of a Lossless Moving Target Defense Mechanism
    Zal, Mariusz
    Michalski, Marek
    Zwierzykowski, Piotr
    ELECTRONICS, 2024, 13 (05)
  • [22] A Signaling Game Model for Moving Target Defense
    Feng, Xiaotao
    Zheng, Zizhan
    Cansever, Derya
    Swami, Ananthram
    Mohapatra, Prasant
    IEEE INFOCOM 2017 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2017,
  • [23] Toward a Moving Target Defense for Web Applications
    Taguinod, Marthony
    Doupe, Adam
    Zhao, Ziming
    Ahn, Gail-Joon
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2015, : 510 - 517
  • [24] Using Dynamic Addressing for a Moving Target Defense
    Groat, Stephen
    Dunlop, Matthew
    Marchany, Randy
    Tront, Joseph
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2011, : 84 - 91
  • [25] Turtle Consensus: Moving Target Defense for Consensus
    Nikolaou, Stavros
    Van Renesse, Robbert
    PROCEEDINGS OF THE 16TH ANNUAL MIDDLEWARE CONFERENCE, 2015, : 185 - 196
  • [26] Web Deception towards Moving Target Defense
    Djamaluddin, Basirudin
    Alnazeer, Ahmed
    Azzedin, Farag
    2018 52ND ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2018, : 249 - 253
  • [27] Research and development of moving target defense technology
    Cai G.
    Wang B.
    Wang T.
    Luo Y.
    Wang X.
    Cui X.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2016, 53 (05): : 968 - 987
  • [28] Moving Target Defense for Securing SCADA Communications
    Heydari, Vahid
    IEEE ACCESS, 2018, 6 : 33329 - 33343
  • [29] Effectiveness of Port Hopping as a Moving Target Defense
    Luo, Yue-Bin
    Wang, Bao-Sheng
    Cai, Gui-Lin
    2014 7TH INTERNATIONAL CONFERENCE ON SECURITY TECHNOLOGY (SECTECH), 2014, : 7 - 10
  • [30] Repeatable Experimentation for Cybersecurity Moving Target Defense
    Acosta, Jaime C.
    Clarke, Luisana
    Medina, Stephanie
    Akbar, Monika
    Hossain, Mahmud Shahriar
    Free-Nelson, Frederica
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2021, PT I, 2021, 398 : 82 - 99