2018
DOI: 10.1109/tifs.2017.2779436
|View full text |Cite
|
Sign up to set email alerts
|

Misery Digraphs: Delaying Intrusion Attacks in Obscure Clouds

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(15 citation statements)
references
References 30 publications
0
15
0
Order By: Relevance
“…Almohri et al. [9] propose to delay remote attackers by strategically placing decoys in the cloud network. Similarly, Pham et al.…”
Section: Background and Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…Almohri et al. [9] propose to delay remote attackers by strategically placing decoys in the cloud network. Similarly, Pham et al.…”
Section: Background and Motivationmentioning
confidence: 99%
“…Brzeczko et al [28] present an active deception model to secure cloud infrastructures by re-routing potential intruders to decoys. Almohri et al [9] propose to delay remote attackers by strategically placing decoys in the cloud network. Similarly, Pham et al [29] design a deceptive topology for virtual network from the perspective of stealthy attackers.…”
Section: Defensive Deception For Cloud Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…VM live and cold migration propose to repeatedly relocate VMs across various physical hosts. Doing so for the purpose of defense has been addressed in previous work dealing with MTD and network defense in general [1,6,17,22,24,34,39], with suggested schemes generally differing in whether a VM's state is preserved or not. State preserving migration that we denote as live migration intends to seamlessly move a VM out of the attacker's reach while keeping it as is.…”
Section: Defense Techniquesmentioning
confidence: 99%
“…There are many security solutions proposed so far based on MTD in many areas including cloud computing, DDoS protection, and web security. [8][9][10][11] Software defined networking (SDN) is a very well-established networking paradigm. 12,13 Its fundamental goal is the separation of control and data planes and provision of central management.…”
Section: Introductionmentioning
confidence: 99%