Proceedings of the 5th ACM Workshop on Moving Target Defense 2018
DOI: 10.1145/3268966.3268972
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Concurrent Moving Target Defenses

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…us, although these single MTD mechanisms may result in some success in resisting automated worms and some low-level attackers, sophisticated attackers will make them invalid by combining multiple pieces of information (e.g., MAC address, operating system information, open ports, running services, and potential vulnerabilities) to identify these hosts whose single or limited system configuration parameters keep changing. To address this shortcoming, Connell et al [19] presented a concurrent MTDs model that combines service reconfiguration and IP reconfiguration to improve defense effectiveness. Unfortunately, the two MTDs tend to interfere with each other, which will affect the normal operation of the system.…”
Section: Related Workmentioning
confidence: 99%
“…us, although these single MTD mechanisms may result in some success in resisting automated worms and some low-level attackers, sophisticated attackers will make them invalid by combining multiple pieces of information (e.g., MAC address, operating system information, open ports, running services, and potential vulnerabilities) to identify these hosts whose single or limited system configuration parameters keep changing. To address this shortcoming, Connell et al [19] presented a concurrent MTDs model that combines service reconfiguration and IP reconfiguration to improve defense effectiveness. Unfortunately, the two MTDs tend to interfere with each other, which will affect the normal operation of the system.…”
Section: Related Workmentioning
confidence: 99%
“…Okhravi et al [39] designed the Trusted Dynamic Logical Heterogeneity System (TALENT) to change its hardware platform and operating system. Connell et al [40] proposed a method to defend against multistep attacks by transforming the service platform and IP address, and they analyzed the effectiveness of the method. Although these searches integrated several MTD technologies, they did not consider the defense strategy when faced with multiple attacks.…”
Section: B Efficient Policy Selectionmentioning
confidence: 99%