Characterizing the Running Patterns of Moving Target Defense Mechanisms

被引:0
|
作者
Cai, Guilin [1 ]
Wang, Baosheng [1 ]
Luo, Yuebin [1 ]
Li, Sudan [1 ]
Wang, Xiaofeng [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
关键词
Moving Target Defense; security; fundamental running patterns; confirmation;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Moving Target Defense (MTD) has been proposed as a game-changing theme to increase the work effort to attack as well as the security of target system. There has been proposed a multitude of MTD mechanisms. Generally, these mechanisms follow some fundamental running patterns which determine their functionalities. In this paper, we introduce three main schools of thought on MTD mechanisms systematically and categorize the related works according to them. Then we identify and define three fundamental running patterns exhibited by these MTD mechanisms. Thereafter, we use five MTD mechanisms, which belong to the three schools of thought, as cases to confirm the patterns presented. This work can help the novices of this field to understand the running behaviours of MTDs better and easier, and can also give developers design guidance of new MTD system by providing insights of the running patterns.
引用
收藏
页码:191 / 196
页数:6
相关论文
共 50 条
  • [31] Moving target defense:state of the art and characteristics
    Gui-lin CAI
    Bao-sheng WANG
    Wei HU
    Tian-zuo WANG
    FrontiersofInformationTechnology&ElectronicEngineering, 2016, 17 (11) : 1122 - 1153
  • [32] A Model for Analyzing the Effectiveness of Moving Target Defense
    Zhao, Guangsheng
    Xiong, Xinli
    Wu, Huaying
    ICCNS 2018: PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK SECURITY, 2018, : 17 - 21
  • [33] Enforcing Optimal Moving Target Defense Policies
    Zheng, Jianjun
    Namin, Akbar Siami
    2019 IEEE 43RD ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 1, 2019, : 753 - 759
  • [34] Research on moving target defense based on SDN
    Chen, Mingyong
    Wu, Weimin
    GREEN ENERGY AND SUSTAINABLE DEVELOPMENT I, 2017, 1864
  • [35] Moving target defense: state of the art and characteristics
    Gui-lin Cai
    Bao-sheng Wang
    Wei Hu
    Tian-zuo Wang
    Frontiers of Information Technology & Electronic Engineering, 2016, 17 : 1122 - 1153
  • [36] Survey on quantitative evaluations of moving target defense
    Huanruo LI
    Yunfei GUO
    Shumin HUO
    Guozhen CHENG
    Wenyan LIU
    网络与信息安全学报, 2018, 4 (09) : 66 - 76
  • [37] Moving Target Defense for Virtual Network Functions
    Peretz, Reuven
    Shenzis, Shlomo
    Hay, David
    NOMS 2020 - PROCEEDINGS OF THE 2020 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM 2020: MANAGEMENT IN THE AGE OF SOFTWARIZATION AND ARTIFICIAL INTELLIGENCE, 2020,
  • [38] Computer Network Deception as a Moving Target Defense
    Urias, Vincent E.
    Stout, William M. S.
    Loverro, Caleb
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 101 - 106
  • [39] Moving target defense: state of the art and characteristics
    Cai, Gui-lin
    Wang, Bao-sheng
    Hu, Wei
    Wang, Tian-zuo
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2016, 17 (11) : 1122 - 1153
  • [40] Moving Target Defense Against Injection Attacks
    Zhang, Huan
    Zheng, Kangfeng
    Yan, Xiaodan
    Luo, Shoushan
    Wu, Bin
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 518 - 532