Moving target defense in cloud computing: A systematic mapping study

M Torquato, M Vieira - Computers & Security, 2020 - Elsevier
Abstract Moving Target Defense (MTD) consists of applying system reconfiguration (eg, VM
migration, IP shuffling) to dynamically change the available attack surface. MTD makes use …

Autonomic communications in software-driven networks

Z Zhao, E Schiller, E Kalogeiton, T Braun… - IEEE journal on …, 2017 - ieeexplore.ieee.org
Autonomic communications aim to provide the quality-of-service in networks using self-
management mechanisms. It inherits many characteristics from autonomic computing, in …

[PDF][PDF] A new access control scheme for protecting distributed cloud services and resources

S Rizvi, J Mitchell - Services Transactions on Cloud Computing …, 2016 - researchgate.net
Cloud computing is clearly one of today's most dominant paradigms in the Information
Technology (IT) industry due to its scalable, flexible, and cost-efficient access to …

Hiding critical targets in smart grid networks

W Bao, Q Li - 2018 International Conference on Computing …, 2018 - ieeexplore.ieee.org
With the integration of advanced communication technologies, the power grid is expected to
greatly enhance efficiency and reliability of future energy delivery. However, since most …

Real-time Detection of Botnet Behavior in Cloud Using Domain Generation Algorithm

V Kumar, S Kumar, AK Gupta - Proceedings of the International …, 2016 - dl.acm.org
In the last few years, the high acceptability of service computing delivered over the internet
has exponentially created immense security challenges for the services providers. Cyber …

가상머신마이그레이션을위한OTP 기반동적인증프레임워크

이은지, 박춘식, 곽진 - 정보보호학회논문지, 2017 - dbpia.co.kr
가상머신 마이그레이션 과정에서 무단 접근, 데이터 변조 등의 보안 위협이 발생할 수 있다.
특히, 가상머신 마이그레이션은 사용자의 주요 데이터 및 중요 인프라 정보를 전송해야하기 …

OTP-Based Dynamic Authentication Framework for Virtual Machine Migration

EJ Lee, CS Park, J Kwak - Journal of the Korea Institute of …, 2017 - koreascience.kr
Security threats such as unauthorized access and data tampering can occur during the
virtual machine migration process. In particular, since virtual machine migration requires …

[引用][C] 基于移动目标防御的内网防渗透技术研究

崔臣浩, 祝跃飞, 李伟, 王凯 - 计算机应用研究, 2016