Characterizing the Running Patterns of Moving Target Defense Mechanisms

被引:0
|
作者
Cai, Guilin [1 ]
Wang, Baosheng [1 ]
Luo, Yuebin [1 ]
Li, Sudan [1 ]
Wang, Xiaofeng [1 ]
机构
[1] Natl Univ Def Technol, Coll Comp, Changsha, Hunan, Peoples R China
关键词
Moving Target Defense; security; fundamental running patterns; confirmation;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Moving Target Defense (MTD) has been proposed as a game-changing theme to increase the work effort to attack as well as the security of target system. There has been proposed a multitude of MTD mechanisms. Generally, these mechanisms follow some fundamental running patterns which determine their functionalities. In this paper, we introduce three main schools of thought on MTD mechanisms systematically and categorize the related works according to them. Then we identify and define three fundamental running patterns exhibited by these MTD mechanisms. Thereafter, we use five MTD mechanisms, which belong to the three schools of thought, as cases to confirm the patterns presented. This work can help the novices of this field to understand the running behaviours of MTDs better and easier, and can also give developers design guidance of new MTD system by providing insights of the running patterns.
引用
收藏
页码:191 / 196
页数:6
相关论文
共 50 条
  • [41] Markov Modeling of Moving Target Defense Games
    Maleki, Hoda
    Valizadeh, Saeed
    Koch, William
    Bestavros, Azer
    van Dijk, Marten
    MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE, 2016, : 81 - 92
  • [42] Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception
    Ge, Mengmeng
    Cho, Jin-Hee
    Kim, Dongseong
    Dixit, Gaurav
    Chen, Ing-Ray
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (01)
  • [43] Study of Dynamic Defense Technique to Overcome Drawbacks of Moving Target Defense
    Bhopi, Sachin Kailas
    Dongre, Nilima M.
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 637 - 641
  • [44] Dynamic Application Rotation Environment for Moving Target Defense
    Thompson, Michael
    Muggier, Michael
    Mendolla, Marilyne
    Ike, Moses
    2016 RESILIENCE WEEK (RWS), 2016, : 17 - 26
  • [45] Analysis of Network Address Shuffling as a Moving Target Defense
    Carroll, Thomas E.
    Crouse, Michael
    Fulp, Errin W.
    Berenhaut, Kenneth S.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 701 - 706
  • [46] A Survey on the Moving Target Defense Strategies: An Architectural Perspective
    Jianjun Zheng
    Akbar Siami Namin
    Journal of Computer Science and Technology, 2019, 34 : 207 - 233
  • [47] DDoS Attack Isolation using Moving Target Defense
    Department, Kansal
    Dave, Mayank
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 511 - 514
  • [48] Game theoretic analysis for the mechanism of moving target defense
    Cai, Gui-lin
    Wang, Bao-sheng
    Xing, Qian-qian
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2017, 18 (12) : 2017 - 2034
  • [49] Moving Target Defense - a Journey from Idea to Product
    Li, Jason
    Yackoski, Justin
    Evancich, Nicholas
    MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE, 2016, : 69 - 79
  • [50] Moving Target Defense for the cloud/edge Telco environments
    Escaleira, Pedro
    Cunha, Vitor A.
    Gomes, Diogo
    Barraca, Joao P.
    Aguiar, Rui L.
    INTERNET OF THINGS, 2023, 24