skip to main content
10.1145/2808475.2808476acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article
Public Access

A Quantitative Framework for Moving Target Defense Effectiveness Evaluation

Published:12 October 2015Publication History

ABSTRACT

Static defense has proven to be a brittle mechanism for defending against cyber attack. Despite this, proactive defensive measures have not been widely deployed. This is because flexible proactive defensive measures such as Moving Target Defense (MTD) have as much potential to interfere with a network's ability to support the mission as they do to defend the network. In this paper we introduce an approach to defining and measuring MTD effects applied in a network environment to help guide MTD deployment decisions that successfully balance the potential security benefits of MTD deployment against the potential productivity costs.

References

  1. M. D. Adams, S. D. Hitefield, B. Hoy, M. C. Fowler, and T. C. Clancy. Application of cybernetics and control theory for a new paradigm in cybersecurity. CoRR, abs/1311.0257, 2013.Google ScholarGoogle Scholar
  2. S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. Defending against hitlist worms using network address space randomization. Computer Networks, 51(12):3471--3490, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. K. M. Carter, J. F. Riordan, and H. Okhravi. A game theoretic approach to strategy determination for dynamic platform defenses. In Jajodia and SunciteMTD2014, pages 21--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. E. Crovella, M. Harchol-Balter, and C. D. Murta. Task assignment in a distributed system (extended abstract): improving performance by unbalancing load. In ACM SIGMETRICS Performance Evaluation Review, volume 26, pages 268--269. ACM, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. M. Hutchins, M. J. Cloppert, and R. M. A. and. Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In J. Ryan, editor, Leading Issues in Information Warfare and Security Research, volume 1, pages 80--106. Academic Publishing International, Reading, United Kingdom, 2011.Google ScholarGoogle Scholar
  6. S. Jajodia and K. Sun, editors. Proceedings of MTD'14: The First ACM Workshop on Moving Target Defense, New York, 2014. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Medina, I. Matta, and J. Byers. On the origin of power laws in internet topologies. SIGCOMM Comput. Commun. Rev., 30(2):18--28, Apr. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. Stoneburner. Underlying technical models for information technology security. NIST Special Publication 800--33, National Institute of Standards and Technology, Dec. 2001.Google ScholarGoogle Scholar
  9. B. M. Waxman. Routing of multipoint connections. Selected Areas in Communications, IEEE Journal on, 6(9):1617--1622, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Yackoski, H. Bullen, X. Yu, and J. Li. Applying self-shielding dynamic to the network architecture. In S. Jajodia, A. K. Ghosh, V. S. Subrahmanian, V. Swarup, C. Wang, and X. S. Wang, editors, Moving Target Defense II: Applications of Game Theory and Adversarial Modeling, volume 100 of Advances in Information Security, pages 97--115. Springer, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  11. J. Yackoski, J. Li, S. A. DeLoach, and X. Ou. Mission-oriented moving target defense based on cryptographically strong network dynamics. In CSIIRW'13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Yackoski, P. Xie, H. Bullen, J. Li, and K. Sun. A Self-shielding Dynamic Network Architecture. In MILCOM'2011: Military Communications Conference 2011, pages 1381--1386, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  13. M. Zhu, Z. Hu, and P. Liu. Reinforcement learning algorithms for adaptive cyber defense against Heartbleed. In Jajodia and SunciteMTD2014, pages 51--58. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A Quantitative Framework for Moving Target Defense Effectiveness Evaluation

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              MTD '15: Proceedings of the Second ACM Workshop on Moving Target Defense
              October 2015
              114 pages
              ISBN:9781450338233
              DOI:10.1145/2808475

              Copyright © 2015 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 12 October 2015

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              MTD '15 Paper Acceptance Rate8of19submissions,42%Overall Acceptance Rate40of92submissions,43%

              Upcoming Conference

              ICSE 2025

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader