A comparison of moving target defense strategies

被引:1
|
作者
Zhang, Jingzhe [1 ]
Wang, Dongxia [1 ]
Feng, Xuewei [1 ]
机构
[1] Natl Key Lab Sci & Technol Informat Syst Secur, Beijing, Peoples R China
关键词
security; moving target defense; strategy; diversification;
D O I
10.1109/MASS.2018.00084
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
this paper focuses on discussing the strategy of moving target defense (MTD) system. We divide the strategies of MTD system into two categories: User-relevant strategy and User-irrelevant strategy. Also we analyze the two strategies, and give the more detailed classifications of two strategies. In addition, we discuss each detailed classifications of strategies, and make a comparison between these strategies. The comparison about time complexity and enhancement of security. At last, we conduct experiments on MTD web service system and get some results. Also, we point some further research work that we can do in future.
引用
收藏
页码:543 / 547
页数:5
相关论文
共 50 条
  • [41] Moving target defense: state of the art and characteristics
    Cai, Gui-lin
    Wang, Bao-sheng
    Hu, Wei
    Wang, Tian-zuo
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2016, 17 (11) : 1122 - 1153
  • [42] Moving Target Defense Against Injection Attacks
    Zhang, Huan
    Zheng, Kangfeng
    Yan, Xiaodan
    Luo, Shoushan
    Wu, Bin
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING (ICA3PP 2019), PT I, 2020, 11944 : 518 - 532
  • [43] Markov Modeling of Moving Target Defense Games
    Maleki, Hoda
    Valizadeh, Saeed
    Koch, William
    Bestavros, Azer
    van Dijk, Marten
    MTD'16: PROCEEDINGS OF THE 2016 ACM WORKSHOP ON MOVING TARGET DEFENSE, 2016, : 81 - 92
  • [44] Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception
    Ge, Mengmeng
    Cho, Jin-Hee
    Kim, Dongseong
    Dixit, Gaurav
    Chen, Ing-Ray
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (01)
  • [45] Study of Dynamic Defense Technique to Overcome Drawbacks of Moving Target Defense
    Bhopi, Sachin Kailas
    Dongre, Nilima M.
    2015 IEEE INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING (ICIP), 2015, : 637 - 641
  • [46] Attacker Skill, Defender Strategies and the Effectiveness of Migration-Based Moving Target Defense in Cyber Systems
    Ben-Asher, Noam
    Morris-King, James
    Thompson, Brian
    Glodek, William
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 21 - 30
  • [47] Dynamic Application Rotation Environment for Moving Target Defense
    Thompson, Michael
    Muggier, Michael
    Mendolla, Marilyne
    Ike, Moses
    2016 RESILIENCE WEEK (RWS), 2016, : 17 - 26
  • [48] Analysis of Network Address Shuffling as a Moving Target Defense
    Carroll, Thomas E.
    Crouse, Michael
    Fulp, Errin W.
    Berenhaut, Kenneth S.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 701 - 706
  • [49] DDoS Attack Isolation using Moving Target Defense
    Department, Kansal
    Dave, Mayank
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 511 - 514
  • [50] Characterizing the Running Patterns of Moving Target Defense Mechanisms
    Cai, Guilin
    Wang, Baosheng
    Luo, Yuebin
    Li, Sudan
    Wang, Xiaofeng
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 191 - 196