2021 IEEE Conference on Dependable and Secure Computing (DSC) 2021
DOI: 10.1109/dsc49826.2021.9346278
|View full text |Cite
|
Sign up to set email alerts
|

FastMove: Fast IP switching Moving Target Defense to mitigate DDOS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(16 citation statements)
references
References 17 publications
0
16
0
Order By: Relevance
“…us, for the attacker trying to target a server or VM, figuring out the identity of the proxy is essential and for obvious reasons non-trivial. Unlike other categories of MTD works, most of the current state-of-the-art proxy-based MTD techniques such as [122][123][124][125][126][127][128][129], except [130], can be implemented successfully in spite of not having SDN-like programmability in the system.…”
Section: Proxy-basedmentioning
confidence: 99%
See 2 more Smart Citations
“…us, for the attacker trying to target a server or VM, figuring out the identity of the proxy is essential and for obvious reasons non-trivial. Unlike other categories of MTD works, most of the current state-of-the-art proxy-based MTD techniques such as [122][123][124][125][126][127][128][129], except [130], can be implemented successfully in spite of not having SDN-like programmability in the system.…”
Section: Proxy-basedmentioning
confidence: 99%
“…ey used an adversarial coupon collection-based mathematical model to formulate the problem. In [127], Bandi et al also presented a MOTAG-like strategy combined with Fast-Flux, a technique used to hide the servers behind an ever-changing system of proxy. e authors proposed FastMove, a shuffling algorithm to determine the number of legitimate clients on each proxy server in order to save the largest possible number of clients.…”
Section: Proxy-basedmentioning
confidence: 99%
See 1 more Smart Citation
“…In [75], an MTD architecture is introduced that adds a layer of proxy servers between the user and application server to reduce the impact of DDoS attacks. Each of the proxies act as a NAT, storing the address mappings between internal and external network.…”
Section: Host Mutationmentioning
confidence: 99%
“…We found three main approaches as to when to apply MTD strategies. The most basic of them is timer-based, when new values are calculated after a certain period of time, such as [17,109,110] or [75]. It is mostly used for short-lived virtual addresses or temporal client-proxy assignments.…”
Section: When To Movementioning
confidence: 99%