Ghost-MTD: Moving Target Defense via Protocol Mutation for Mission-Critical Cloud Systems

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MTD CBITS: Moving Target Defense for Cloud-Based IT Systems

The static nature of current IT systems gives attackers the extremely valuable advantage of time, as adversaries can take their time and plan attacks at their leisure. Although cloud infrastructures have increased the automation options for managing IT systems, the introduction of Moving Target Defense (MTD) techniques at the entire IT system level is still very challenging. The core idea of MT...

متن کامل

Random Host Mutation for Moving Target Defense

Exploiting static configuration of networks and hosts has always been a great advantage for design and launching of decisive attacks. Network reconnaissance of IP addresses and ports is prerequisite to many host and network attacks. At the same time, knowing IP addresses is required for service reachability in IP networks, which makes complete concealment of IP address for servers infeasible. I...

متن کامل

Collaborative Monitoring of Moving Target Defense Mechanisms for Cloud

Cloud computing has become a prominent paradigm in recent years. It has gained popularity among the information technology (IT) world due to its ability to transfer the capital expenditure to operational expenditure [1]. The cloud consumer can get access to high-end computing infrastructure of clouds by only paying for the duration of usage. The other advantages of clouds are: On-demand self-se...

متن کامل

A Framework for Moving Target Defense Quantification

Moving Target Defense (MTD) has emerged as a game changer in the security landscape, as it can create asymmetric uncertainty favoring the defender. Despite the significant work done in this area and the many different techniques that have been proposed, MTD has not yet gained widespread adoption due to several limitations. Specifically, interactions between multiple techniques have not been stu...

متن کامل

Symbiotes and defensive Mutualism: Moving Target Defense

If we wish to break the continual cycle of patching and replacing our core monoculture systems to defend against attacker evasion tactics, we must redesign the way systems are deployed so that the attacker can no longer glean the information about one system that allows attacking any other like system. Hence, a new poly-culture architecture that provides complete uniqueness for each distinct de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Energies

سال: 2020

ISSN: 1996-1073

DOI: 10.3390/en13081883