2015
DOI: 10.1109/tifs.2015.2467358
|View full text |Cite
|
Sign up to set email alerts
|

An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
74
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 107 publications
(75 citation statements)
references
References 25 publications
1
74
0
Order By: Relevance
“…• Other metrics: Based on the unique features of each of the existing MTD approaches, various other types of metrics have been adopted to measure the effectiveness of MTD as follows: -Controllability [125]: This refers to the portion of critical system assets which expose a high vulnerability to an attacker if compromised. -Worm propagation speed [3,78,79]: This measures how much a deployed MTD can slow down actions by an attacker. This also indirectly increases the detection of attackers by earning more time to monitor the attacker.…”
Section: A Metrics For Measuring Mtd Effectivenessmentioning
confidence: 99%
See 1 more Smart Citation
“…• Other metrics: Based on the unique features of each of the existing MTD approaches, various other types of metrics have been adopted to measure the effectiveness of MTD as follows: -Controllability [125]: This refers to the portion of critical system assets which expose a high vulnerability to an attacker if compromised. -Worm propagation speed [3,78,79]: This measures how much a deployed MTD can slow down actions by an attacker. This also indirectly increases the detection of attackers by earning more time to monitor the attacker.…”
Section: A Metrics For Measuring Mtd Effectivenessmentioning
confidence: 99%
“…Some other works also used specific metrics to capture defense cost as follows: -Address space overhead [3]: In deploying Random IP mutation techniques, this refers to the required address space based on mutation speed (e.g., low frequency mutation, LFM, or high frequency mutation, HFM). -Flow table size [78,79,164]: This measures the size of flow table in OpenFlow (OF) switches when OF-RHM (Random Host Mutation) is used in an SDN-based MTD. -Integrated performance cost [34,51]: This metric integrates both performance and security cost.…”
Section: Qos To Usersmentioning
confidence: 99%
“…The OF-RHM/RHM research team has been conducting ongoing research based on RHM [15][16][17]. HIDE, the latest research area of the RHM research team, includes fingerprint mutation and attack surface expansion, operating a honeypot cloud as well as network address mutation on the RHM network model.…”
Section: Hidementioning
confidence: 99%
“…We focus on just network level MTD in this paper. The Networkbased Moving Target Defense (NMTD) policy randomizes properties of the network, including IP addresses, MAC addresses, port numbers, and even the communication routing and protocol [1]. Software-Defined Network (SDN) decouples the control plane and data plane, making the network management and expansion more flexible.…”
Section: Introductionmentioning
confidence: 99%