skip to main content
10.1145/2459976.2460017acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

A layered approach to understanding network dependencies on moving target defense mechanisms

Published: 08 January 2013 Publication History

Abstract

Moving target defense is a conceptual shift from the standard defense mechanisms used on today's statically configured networks. Most mechanisms for moving target defense are limited in the protocols and applications they can support. In this paper, we outline a simple method to identify the network dependencies these have and begin the discussion of where mitigations for dependencies broken by these mechanisms should reside.

References

[1]
Kewley, D.; Fink, R.; Lowry, J.; Dean, M.;, "Dynamic approaches to thwart adversary intelligence gathering," DARPA Information Survivability Conference & Exposition II, 2001. DISCEX '01. Proceedings, vol.1, no., pp.176--185 vol.1, 2001
[2]
Michalski, J.; Price, C.; Stanton, E.; Chua, E. L.; Seah, K.; Heng, W. Y.; Pheng, T. C. Final report for the network security mechanisms utilizing network address translation LDRD project. Technical Report SAND2002--3613, Sandia National Laboratories, November 2002.
[3]
Repik, K. M. (2008). Defeating Adversary Network Intelligence Efforts with Active Cyber Defense Techniques. Air Force Institute of Technology.
[4]
Zhuang, R.; Zhang, S.; DeLoach, S. A.; Ou, X.; Singhal, A. Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense. National Symposium on Moving Target Research. June 11, 2012, Annapolis, MD.
[5]
Carvalho, Marco, J. M. Bradshaw, Larry Bunch, Tom Eskridge, Paul J. Feltovich, Robert H. Hoffman, and Daniel Kidwell. Command and Control Requirements for Moving Target Defense. IEEE Intelligent Systems, May/June 2012 (vol. 27 iss. 3), pp. 79--85.

Cited By

View all
  • (2022)A Survey on Moving Target Defense for Networks: A Practical ViewElectronics10.3390/electronics1118288611:18(2886)Online publication date: 12-Sep-2022
  • (2022)Dynamic defenses in cyber security: Techniques, methods and challengesDigital Communications and Networks10.1016/j.dcan.2021.07.0068:4(422-435)Online publication date: Aug-2022
  • (2018)A Novel Route Randomization Approach for Moving Target Defense2018 IEEE 18th International Conference on Communication Technology (ICCT)10.1109/ICCT.2018.8600062(11-15)Online publication date: Oct-2018
  • Show More Cited By

Index Terms

  1. A layered approach to understanding network dependencies on moving target defense mechanisms

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Other conferences
        CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
        January 2013
        282 pages
        ISBN:9781450316873
        DOI:10.1145/2459976

        Sponsors

        • Los Alamos National Labs: Los Alamos National Labs
        • Sandia National Labs: Sandia National Laboratories
        • DOE: Department of Energy
        • Oak Ridge National Laboratory
        • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
        • BERKELEYLAB: Lawrence National Berkeley Laboratory
        • Argonne Natl Lab: Argonne National Lab
        • Idaho National Lab.: Idaho National Laboratory
        • Pacific Northwest National Laboratory
        • Nevada National Security Site: Nevada National Security Site

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 08 January 2013

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tag

        1. moving target defense (MTD)

        Qualifiers

        • Research-article

        Conference

        CSIIRW '13
        Sponsor:
        • Los Alamos National Labs
        • Sandia National Labs
        • DOE
        • Lawrence Livermore National Lab.
        • BERKELEYLAB
        • Argonne Natl Lab
        • Idaho National Lab.
        • Nevada National Security Site
        CSIIRW '13: Cyber Security and Information Intelligence
        January 8 - 10, 2013
        Tennessee, Oak Ridge, USA

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)3
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 07 Mar 2025

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)A Survey on Moving Target Defense for Networks: A Practical ViewElectronics10.3390/electronics1118288611:18(2886)Online publication date: 12-Sep-2022
        • (2022)Dynamic defenses in cyber security: Techniques, methods and challengesDigital Communications and Networks10.1016/j.dcan.2021.07.0068:4(422-435)Online publication date: Aug-2022
        • (2018)A Novel Route Randomization Approach for Moving Target Defense2018 IEEE 18th International Conference on Communication Technology (ICCT)10.1109/ICCT.2018.8600062(11-15)Online publication date: Oct-2018
        • (2016)Moving target defense: state of the art and characteristicsFrontiers of Information Technology & Electronic Engineering10.1631/FITEE.160132117:11(1122-1153)Online publication date: 11-Nov-2016
        • (2016)Dependency Graph Analysis and Moving Target Defense SelectionProceedings of the 2016 ACM Workshop on Moving Target Defense10.1145/2995272.2995277(105-116)Online publication date: 24-Oct-2016
        • (2016)A new dynamic address solution for moving target defense2016 IEEE Information Technology, Networking, Electronic and Automation Control Conference10.1109/ITNEC.2016.7560545(1149-1152)Online publication date: May-2016
        • (2016)Ethernet address resolution in the context of dynamic IP address changes2016 IEEE International Conference of Online Analysis and Computing Science (ICOACS)10.1109/ICOACS.2016.7563103(306-309)Online publication date: May-2016

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media