ABSTRACT
Static defense has proven to be a brittle mechanism for defending against cyber attack. Despite this, proactive defensive measures have not been widely deployed. This is because flexible proactive defensive measures such as Moving Target Defense (MTD) have as much potential to interfere with a network's ability to support the mission as they do to defend the network. In this paper we introduce an approach to defining and measuring MTD effects applied in a network environment to help guide MTD deployment decisions that successfully balance the potential security benefits of MTD deployment against the potential productivity costs.
- M. D. Adams, S. D. Hitefield, B. Hoy, M. C. Fowler, and T. C. Clancy. Application of cybernetics and control theory for a new paradigm in cybersecurity. CoRR, abs/1311.0257, 2013.Google Scholar
- S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. Defending against hitlist worms using network address space randomization. Computer Networks, 51(12):3471--3490, 2007. Google ScholarDigital Library
- K. M. Carter, J. F. Riordan, and H. Okhravi. A game theoretic approach to strategy determination for dynamic platform defenses. In Jajodia and SunciteMTD2014, pages 21--30. Google ScholarDigital Library
- M. E. Crovella, M. Harchol-Balter, and C. D. Murta. Task assignment in a distributed system (extended abstract): improving performance by unbalancing load. In ACM SIGMETRICS Performance Evaluation Review, volume 26, pages 268--269. ACM, 1998. Google ScholarDigital Library
- E. M. Hutchins, M. J. Cloppert, and R. M. A. and. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In J. Ryan, editor, Leading Issues in Information Warfare and Security Research, volume 1, pages 80--106. Academic Publishing International, Reading, United Kingdom, 2011.Google Scholar
- S. Jajodia and K. Sun, editors. Proceedings of MTD'14: The First ACM Workshop on Moving Target Defense, New York, 2014. ACM. Google ScholarDigital Library
- A. Medina, I. Matta, and J. Byers. On the origin of power laws in internet topologies. SIGCOMM Comput. Commun. Rev., 30(2):18--28, Apr. 2000. Google ScholarDigital Library
- G. Stoneburner. Underlying technical models for information technology security. NIST Special Publication 800--33, National Institute of Standards and Technology, Dec. 2001.Google Scholar
- B. M. Waxman. Routing of multipoint connections. Selected Areas in Communications, IEEE Journal on, 6(9):1617--1622, 1988. Google ScholarDigital Library
- J. Yackoski, H. Bullen, X. Yu, and J. Li. Applying self-shielding dynamic to the network architecture. In S. Jajodia, A. K. Ghosh, V. S. Subrahmanian, V. Swarup, C. Wang, and X. S. Wang, editors, Moving Target Defense II: Applications of Game Theory and Adversarial Modeling, volume 100 of Advances in Information Security, pages 97--115. Springer, 2013.Google ScholarCross Ref
- J. Yackoski, J. Li, S. A. DeLoach, and X. Ou. Mission-oriented moving target defense based on cryptographically strong network dynamics. In CSIIRW'13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013. Google ScholarDigital Library
- J. Yackoski, P. Xie, H. Bullen, J. Li, and K. Sun. A Self-shielding Dynamic Network Architecture. In MILCOM'2011: Military Communications Conference 2011, pages 1381--1386, 2011.Google ScholarCross Ref
- M. Zhu, Z. Hu, and P. Liu. Reinforcement learning algorithms for adaptive cyber defense against Heartbleed. In Jajodia and SunciteMTD2014, pages 51--58. Google ScholarDigital Library
Index Terms
- A Quantitative Framework for Moving Target Defense Effectiveness Evaluation
Recommendations
Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks
MTD '16: Proceedings of the 2016 ACM Workshop on Moving Target DefenseIn this paper, we describe the results of several experiments designed to test two dynamic network moving target defenses against a propagating data exfiltration attack. We designed a collection of metrics to assess the costs to mission activities and ...
Integrated moving target defense and control reconfiguration for securing Cyber-Physical systems
AbstractWith the increasingly connected nature of Cyber-Physical Systems (CPS), new attack vectors are emerging that were previously not considered in the design process. Specifically, autonomous vehicles are one of the most at risk CPS applications, ...
A Survey of Security Models Using Effective Moving Target Defenses
This article describes how nowadays, attackers are targeting valuable assets and infrastructures in networked systems causing an impact on enterprises and individuals. By implementing moving target defenses helps to prevent cyber-attacks by changing the ...
Comments