Proceedings of the 2016 ACM Workshop on Moving Target Defense 2016
DOI: 10.1145/2995272.2995283
|View full text |Cite
|
Sign up to set email alerts
|

Mayflies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…The authors of [106] proposed a bio-inspired MTD technique by using SDN to protect distributed systems utilizing short-lived nodes that are used during computation, then discarded, but which can reappear later with changed properties. The algorithm is capable of moving nodes between hardware and hypervisors and performing IP hopping, as well as changing the characteristics of the node itself, like different OS.…”
Section: Address and Port Mutationmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors of [106] proposed a bio-inspired MTD technique by using SDN to protect distributed systems utilizing short-lived nodes that are used during computation, then discarded, but which can reappear later with changed properties. The algorithm is capable of moving nodes between hardware and hypervisors and performing IP hopping, as well as changing the characteristics of the node itself, like different OS.…”
Section: Address and Port Mutationmentioning
confidence: 99%
“…MTD strategies can be applied when an active attack has been detected or modified to occur more often for hosts that are more active in the network. This approach can be found in [79,82,91,116] or [106]. Lastly, architectures utilizing per packet address or route mutation apply this MTD strategy to every single packet reaching the switch [73,93,99].…”
Section: When To Movementioning
confidence: 99%
See 1 more Smart Citation