Ghost-MTD: Moving Target Defense via Protocol Mutation for Mission-Critical Cloud Systems
نویسندگان
چکیده
منابع مشابه
MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
The static nature of current IT systems gives attackers the extremely valuable advantage of time, as adversaries can take their time and plan attacks at their leisure. Although cloud infrastructures have increased the automation options for managing IT systems, the introduction of Moving Target Defense (MTD) techniques at the entire IT system level is still very challenging. The core idea of MT...
متن کاملRandom Host Mutation for Moving Target Defense
Exploiting static configuration of networks and hosts has always been a great advantage for design and launching of decisive attacks. Network reconnaissance of IP addresses and ports is prerequisite to many host and network attacks. At the same time, knowing IP addresses is required for service reachability in IP networks, which makes complete concealment of IP address for servers infeasible. I...
متن کاملCollaborative Monitoring of Moving Target Defense Mechanisms for Cloud
Cloud computing has become a prominent paradigm in recent years. It has gained popularity among the information technology (IT) world due to its ability to transfer the capital expenditure to operational expenditure [1]. The cloud consumer can get access to high-end computing infrastructure of clouds by only paying for the duration of usage. The other advantages of clouds are: On-demand self-se...
متن کاملA Framework for Moving Target Defense Quantification
Moving Target Defense (MTD) has emerged as a game changer in the security landscape, as it can create asymmetric uncertainty favoring the defender. Despite the significant work done in this area and the many different techniques that have been proposed, MTD has not yet gained widespread adoption due to several limitations. Specifically, interactions between multiple techniques have not been stu...
متن کاملSymbiotes and defensive Mutualism: Moving Target Defense
If we wish to break the continual cycle of patching and replacing our core monoculture systems to defend against attacker evasion tactics, we must redesign the way systems are deployed so that the attacker can no longer glean the information about one system that allows attacking any other like system. Hence, a new poly-culture architecture that provides complete uniqueness for each distinct de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Energies
سال: 2020
ISSN: 1996-1073
DOI: 10.3390/en13081883