2017
DOI: 10.1007/978-3-319-66402-6_11
|View full text |Cite
|
Sign up to set email alerts
|

MTD CBITS: Moving Target Defense for Cloud-Based IT Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 29 publications
0
12
0
Order By: Relevance
“…On similar lines, authors in [118] notice that creating an entire file system replica takes two more minutes in the case of an MTD system when compared to a non-MTD enabled system refresh. On the contrary, [143] does not notice negligible performance overhead for instance replacements in a 14 node system (where one is a controller node and the others are compute nodes). Although, they do notice a larger number of HTTP error packets on the wire when using the MTD.…”
Section: A) Considers Only Security Of Individual Defenses: Mostmentioning
confidence: 94%
See 2 more Smart Citations
“…On similar lines, authors in [118] notice that creating an entire file system replica takes two more minutes in the case of an MTD system when compared to a non-MTD enabled system refresh. On the contrary, [143] does not notice negligible performance overhead for instance replacements in a 14 node system (where one is a controller node and the others are compute nodes). Although, they do notice a larger number of HTTP error packets on the wire when using the MTD.…”
Section: A) Considers Only Security Of Individual Defenses: Mostmentioning
confidence: 94%
“…[62], [58], [59], [146], [61], [78], [79], [80], [94], [148], [147] [75], [69], [70], [107], [76], [71] [7], [68], [65], [66], [91], [131], [118], [143] Fig . 11: A Moving Target Defense is more effective if it considers the security and performance impacts of the system configurations, both in unison and also when placed in an ensemble of system configurations that the MTD leverages.…”
Section: A Qualitative Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…Bardas et al [18] proposed an MTD platform for cloudbased IT system and analyzed security benefits to verify its performance with an e-commerce scenario. The authors studied how the MTD approach can be applied to the entire IT system and demonstrated its practicality in cloud-based environment using Automated eNterprise network COmpileR (AN-COR) [151].…”
Section: E Cloud-based Web Servicesmentioning
confidence: 99%
“…Zhuang et al [31] presented a preliminary design of a network moving-target defense system and conducted simulation-based experiments on an existing network security simulator called NeSSi2 to study the effects of randomly changing one aspect of the system in reducing attacker's success likelihood. Bardas et al [32] analyzes the costs and security benefits of MTD in cloud based IT systems (CBITS) using a practical attack window model and show how a system managed using MTD CBITS will increase attack difficulty.…”
Section: B Evaluation Models For Mtdmentioning
confidence: 99%