Toward proactive, adaptive defense: A survey on moving target defense

JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …

An effective address mutation approach for disrupting reconnaissance attacks

JH Jafarian, E Al-Shaer, Q Duan - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Network reconnaissance of addresses and ports is prerequisite to a vast majority of cyber
attacks. Meanwhile, the static address configuration of networks and hosts simplifies …

An Adaptive IP Hopping Approach for Moving Target Defense Using a Light‐Weight CNN Detector

X Xu, H Hu, Y Liu, H Zhang… - Security and …, 2021 - Wiley Online Library
Scanning attack is normally the first step of many other network attacks such as DDoS and
propagation worm. Because of easy implementation and high returns, scanning attack …

Changing the game: A micro moving target IPv6 defense for the internet of things

K Zeitz, M Cantrell, R Marchany… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
This letter explores the uses of a micro moving target IPv6 defense (μMT6D). In this initial
experiment we assess the power consumption overhead and detail the overall security …

Scalable anti-censorship framework using moving target defense for web servers

V Heydari, S Kim, SM Yoo - IEEE Transactions on Information …, 2017 - ieeexplore.ieee.org
Although the Internet has become a hub around which every aspect of our lives-from
commerce to leisurely activities-is centered, many around the world are not able to freely …

A novel efficient address mutation scheme for IPv6 networks

S Yan, X Huang, M Ma, P Zhang, Y Ma - IEEE Access, 2016 - ieeexplore.ieee.org
IP mutation is an effective moving target defense method against sniffer or hijacking attack.
The mutation frequency is one of the most important parameters that influence the security of …

MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization

JH Jafarian, A Niakanlahiji - Computers & Security, 2023 - Elsevier
Advanced and persistent multi-staged intrusion attacks are usually conducted by elite well-
resourced cyber threat actors with the goal of bypassing the defense-in-depth and zoning …

Secure vpn using mobile ipv6 based moving target defense

V Heydari, SM Yoo, S Kim - 2016 IEEE Global Communications …, 2016 - ieeexplore.ieee.org
In this paper, we introduce MVPN, a framework for building secure Virtual Private Networks
(VPNs) with a novel Mobile IPv6 based Moving Target Defense strategy. Our approach aids …

Securing critical infrastructure by moving target defense

V Heydari, SM Yoo - Proc. 11th Int. Conf. Cyber Warfare Secur …, 2016 - books.google.com
One of the most important areas of information security is industrial system security. Cyber-
attacks on critical infrastructure networks causing an outage quickly escalate into the worst …

LAN Traffic Capture Applications Using the Libtins Library

AT Costin, D Zinca, V Dobrota - Electronics, 2021 - mdpi.com
Capturing traffic and processing its contents is a valuable skill that when put in the right
hands makes diagnosing and troubleshooting network issues an approachable task. Apart …