Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, 2003.
DOI: 10.1109/isorc.2003.1199253
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive use of network-centric mechanisms in cyber-defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(15 citation statements)
references
References 9 publications
0
15
0
Order By: Relevance
“…Sifalakis et al [4] obscured the data exchange between two peers by shuffling the communication participants that define the sequence for address hopping and determine data spreading. Atighetchi et al [5] created a system that allows hosts to use tunnels to disguise on-going communication, which requires Copyright c 2017 The Institute of Electronics, Information and Communication Engineers participation from both end-points. Badishi et al [6] proposed a random port-hopping scheme to defend against DDoS attacks by changing the communication ports.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Sifalakis et al [4] obscured the data exchange between two peers by shuffling the communication participants that define the sequence for address hopping and determine data spreading. Atighetchi et al [5] created a system that allows hosts to use tunnels to disguise on-going communication, which requires Copyright c 2017 The Institute of Electronics, Information and Communication Engineers participation from both end-points. Badishi et al [6] proposed a random port-hopping scheme to defend against DDoS attacks by changing the communication ports.…”
Section: Related Workmentioning
confidence: 99%
“…Equation (5) ensures that there are no cycles in the routing path. Equation (6) ensures that the maximum routing path length is L. Equation (7) considers the current available bandwidth of every link in the entire network to ensure load balancing of the total network.…”
Section: Definition 4 (Path) For Nodementioning
confidence: 99%
“…Several port hopping implementations have been proposed before: Michael Atighetchi et al [11] develop a port and address hopping mechanism based on time synchronization and random number generation, where ho pping delegate and network address translation (NAT) gateway perform mapping between fake ( address : port) and real (address : port) pairs. Henry C.J.…”
Section: Motivation and Related Workmentioning
confidence: 99%
“…Although several MTD mechanisms [9][10] have been proposed, this paper examines the effectiveness of port hopping [11][12][13][14][15]. These existed works show that port hopping is a promising technique that transforms port number used for communication with random one so as to improve the ability of thwarting cyber attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Their objective of accelerating hitlist decay is somewhat similar to ours; however, both their basic approach (in terms of considering hitlists of live systems) and suggested mechanisms for random address shuffling (primarily DHCP) differ from ours. Similar methods for changing network configurations in order to attempt to thwart malicious activity have been proposed in [5], [14], [19], [15]. We differ from these efforts by focusing on protecting honeynets and demonstrate a simple, scalable, and extensible system for address space randomization that implements several shuffling policies.…”
Section: Background and Related Workmentioning
confidence: 99%