Toward proactive, adaptive defense: A survey on moving target defense

JH Cho, DP Sharma, H Alavizadeh… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Reactive defense mechanisms, such as intrusion detection systems, have made significant
efforts to secure a system or network for the last several decades. However, the nature of …

Moving target defense: state of the art and characteristics

G Cai, B Wang, W Hu, T Wang - Frontiers of Information Technology & …, 2016 - Springer
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the
asymmetric situation between attacks and defenses in cyber-security. Numerous related …

[HTML][HTML] Dynamic defenses in cyber security: Techniques, methods and challenges

Y Zheng, Z Li, X Xu, Q Zhao - Digital Communications and Networks, 2022 - Elsevier
Driven by the rapid development of the Internet of Things, cloud computing and other
emerging technologies, the connotation of cyberspace is constantly expanding and …

A survey on the moving target defense strategies: An architectural perspective

J Zheng, AS Namin - Journal of Computer Science and Technology, 2019 - Springer
As the complexity and the scale of networks continue to grow, the management of the
network operations and security defense has become a challenging task for network …

Attack graph-based moving target defense in software-defined networks

S Yoon, JH Cho, DS Kim, TJ Moore… - … on Network and …, 2020 - ieeexplore.ieee.org
Moving target defense (MTD) has emerged as a proactive defense mechanism aiming to
thwart a potential attacker. The key underlying idea of MTD is to increase uncertainty and …

Mimic defense: a designed‐in cybersecurity defense framework

H Hu, J Wu, Z Wang, G Cheng - IET Information Security, 2018 - Wiley Online Library
In recent years, both academia and industry in cyber security have tried to develop
innovative defense technologies, expecting that to change the rules of the game between …

Resource-aware detection and defense system against multi-type attacks in the cloud: Repeated bayesian stackelberg game

OA Wahab, J Bentahar, H Otrok… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Cloud-based systems are subject to various attack types launched by Virtual Machines
(VMs) manipulated by attackers having different goals and skills. The existing detection and …

Attack surface definitions: A systematic literature review

C Theisen, N Munaiah, M Al-Zyoud, JC Carver… - Information and …, 2018 - Elsevier
Abstract Context Michael Howard conceptualized the attack surface of a software system as
a metaphor for risk assessment during the development and maintenance of software. While …

A network coding and DES based dynamic encryption scheme for moving target defense

H Tang, QT Sun, X Yang, K Long - IEEE Access, 2018 - ieeexplore.ieee.org
Unlike prior efforts in cybersecurity research, a dynamic defense theory, called moving target
defense, increases the complexity and costs for attacks by effectively restricting the …

Frequency-minimal moving target defense using software-defined networking

S Debroy, P Calyam, M Nguyen… - 2016 international …, 2016 - ieeexplore.ieee.org
With the increase of cyber attacks such as DoS, there is a need for intelligent counter-
strategies to protect critical cloud-hosted applications. The challenge for the defense is to …