A Survey of Moving Target Defenses for Network Security
暂无分享,去创建一个
Sailik Sengupta | Subbarao Kambhampati | Dijiang Huang | Ankur Chowdhary | Abdulhakim Sabur | Adel Alshamrani | S. Kambhampati | Dijiang Huang | Ankur Chowdhary | Abdulhakim Sabur | Sailik Sengupta | Adel Alshamrani
[1] Richard Kissel,et al. Glossary of Key Information Security Terms , 2014 .
[2] Mohammed Samaka,et al. Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[3] Ehab Al-Shaer,et al. Taxonomy of conflicts in network security policies , 2006, IEEE Communications Magazine.
[4] Sushil Jajodia,et al. Time-efficient and cost-effective network hardening using attack graphs , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012).
[5] Dorie Minich,et al. Content Management System , 2014 .
[6] Brighten Godfrey,et al. VeriFlow: verifying network-wide invariants in real time , 2012, HotSDN '12.
[7] John Homer. From Attack Graphs to Automated Configuration Management — An Iterative Approach , 2008 .
[8] S. P. Shantharajah,et al. A Study on NSL-KDD Dataset for Intrusion Detection System Based on Classification Algorithms , 2015 .
[9] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[10] Jani Suomalainen,et al. Towards Micro-Segmentation in 5G Network Security , 2016 .
[11] Nathaniel Evans,et al. Multiple OS rotational environment an implemented Moving Target Defense , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).
[12] Kemal Akkaya,et al. Mitigating Selective Jamming Attacks in Smart Meter Data Collection using Moving Target Defense , 2017, Q2SWinet@MSWiM.
[13] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[14] Seungjoon Lee,et al. Network function virtualization: Challenges and opportunities for innovations , 2015, IEEE Communications Magazine.
[15] Pratyusa K. Manadhata,et al. Game Theoretic Approaches to Attack Surface Shifting , 2013, Moving Target Defense.
[16] Shlomo Zilberstein,et al. Dynamic Programming for Partially Observable Stochastic Games , 2004, AAAI.
[17] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.
[18] Abdullah Al-Dujaili,et al. Adversarial Deep Learning for Robust Detection of Binary Encoded Malware , 2018, 2018 IEEE Security and Privacy Workshops (SPW).
[19] Sailik Sengupta,et al. Moving Target Defense for Web Applications using Bayesian Stackelberg Games: (Extended Abstract) , 2016, AAMAS.
[20] Grenville J. Armitage,et al. A survey of techniques for internet traffic classification using machine learning , 2008, IEEE Communications Surveys & Tutorials.
[21] Fabien Pouget,et al. Honeypot-based forensics , 2004 .
[22] Richard Lippmann,et al. Practical Attack Graph Generation for Network Defense , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[23] Peng Xie,et al. A Self-shielding Dynamic Network Architecture , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[24] Dijiang Huang,et al. Moving Target Defense , 2018, Software-Defined Networking and Security.
[25] Wenbin Zheng,et al. Intrusion prevention system design , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[26] Marten van Dijk,et al. Toward a Theory of Cyber Attacks , 2019, ArXiv.
[27] Duohe Ma,et al. Moving Target Network Defense Effectiveness Evaluation Based on Change-Point Detection , 2016 .
[28] Thomas R. Henderson,et al. Network Simulations with the ns-3 Simulator , 2008 .
[29] Daniel R. Simon,et al. Secure traceroute to detect faulty or malicious routing , 2003, CCRV.
[30] George Cybenko,et al. Quantification of moving target cyber defenses , 2015, Defense + Security Symposium.
[31] Sailik Sengupta,et al. Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud , 2018, GameSec.
[32] Duminda Wijesekera,et al. Scalable, graph-based network vulnerability analysis , 2002, CCS '02.
[33] Sateesh K. Peddoju,et al. HIDS: A host based intrusion detection system for cloud computing environment , 2018, Int. J. Syst. Assur. Eng. Manag..
[34] Satinder Singh,et al. Computing Stackelberg Equilibria in Discounted Stochastic Games ( Corrected Version ) , 2012 .
[35] Michael P. Wellman,et al. Multistage Attack Graph Security Games: Heuristic Strategies, with Empirical Game-Theoretic Analysis , 2018, Secur. Commun. Networks.
[36] Aiko Pras,et al. DDoS defense using MTD and SDN , 2018, NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium.
[37] Fernando M. V. Ramos,et al. Software-Defined Networking: A Comprehensive Survey , 2014, Proceedings of the IEEE.
[38] Atul Prakash,et al. Distilling critical attack graph surface iteratively through minimum-cost SAT solving , 2011, ACSAC '11.
[39] Ehab Al-Shaer,et al. Toward Network Configuration Randomization for Moving Target Defense , 2011, Moving Target Defense.
[40] Jeannette M. Wing,et al. Tools for Generating and Analyzing Attack Graphs , 2003, FMCO.
[41] Dijiang Huang,et al. Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments , 2019, IEEE Transactions on Dependable and Secure Computing.
[42] Radha Poovendran,et al. A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense , 2015, GameSec.
[43] Jan Medved,et al. OpenDaylight: Towards a Model-Driven SDN Controller architecture , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[44] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[45] Yevgeniy Vorobeychik,et al. Computing Stackelberg Equilibria in Discounted Stochastic Games , 2012, AAAI.
[46] Daniel A. Menascé,et al. Performance Modeling of Moving Target Defenses , 2017, MTD@CCS.
[47] Prasad Calyam,et al. Frequency-minimal moving target defense using software-defined networking , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).
[48] Demosthenis Teneketzis,et al. Optimal Defense Policies for Partially Observable Spreading Processes on Bayesian Attack Graphs , 2015, MTD@CCS.
[49] Xiao Han,et al. Evaluation of Deception-Based Web Attacks Detection , 2017, MTD@CCS.
[50] Robert J. Ellison,et al. Attack Trees , 2009, Encyclopedia of Biometrics.
[51] Russell J. Clark,et al. Advancing Software-Defined Networks: A Survey , 2017, IEEE Access.
[52] David E. Culler,et al. PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.
[53] Eugene H. Spafford,et al. The design and implementation of tripwire: a file system integrity checker , 1994, CCS '94.
[54] Sushil Jajodia,et al. A moving target defense mechanism for MANETs based on identity virtualization , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[55] Fenlin Liu,et al. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks , 2017, Secur. Commun. Networks.
[56] Chase Qishi Wu,et al. A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.
[57] Scott A. DeLoach,et al. Investigating the application of moving target defenses to network security , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[58] Kevin M. Carter,et al. A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses , 2014, MTD '14.
[59] Sushil Jajodia,et al. A Moving Target Defense Approach to Disrupting Stealthy Botnets , 2016, MTD@CCS.
[60] Pavlin Radoslavov,et al. ONOS: towards an open, distributed SDN OS , 2014, HotSDN.
[61] Somesh Jha,et al. End-to-End Software Diversification of Internet Services , 2011, Moving Target Defense.
[62] Sailik Sengupta,et al. MTDeep: Boosting the Security of Deep Neural Nets Against Adversarial Attacks with Moving Target Defense , 2017, AAAI Workshops.
[63] Volodymyr Mosorov,et al. Nessi2 simulator for large-scale DDoS attack analysis , 2011, Perspective Technologies and Methods in MEMS Design.
[64] Mohammed Samaka,et al. Feasibility of Supervised Machine Learning for Cloud Security , 2016, 2016 International Conference on Information Science and Security (ICISS).
[65] Sushil Jajodia,et al. SHARE , 2018, ACM Transactions on Internet Technology.
[66] Vikram S. Adve,et al. The LLVM Compiler Framework and Infrastructure Tutorial , 2004, LCPC.
[67] Joshua Taylor,et al. A Quantitative Framework for Moving Target Defense Effectiveness Evaluation , 2015, MTD@CCS.
[68] Joshua Taylor,et al. Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks , 2016, MTD@CCS.
[69] Dong Seong Kim,et al. Software Defined Stochastic Model for Moving Target Defense , 2016, AECIA.
[70] Hongwei Shi,et al. Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory , 2020, IEEE Internet of Things Journal.
[71] Hongxin Hu,et al. CHAOS: an SDN-based Moving Target Defense System , 2017, Secur. Commun. Networks.
[72] Dijiang Huang,et al. Software-Defined Networking and Security , 2018 .
[73] L. Shapley,et al. Stochastic Games* , 1953, Proceedings of the National Academy of Sciences.
[74] Michael B. Crouse,et al. Improving the Diversity Defense of Genetic Algorithm-Based Moving Target Approaches , 2012 .
[75] Heejo Lee,et al. Scalable attack graph for risk assessment , 2009, 2009 International Conference on Information Networking.
[76] HoumbSiv Hilde,et al. Quantifying security risk level from CVSS estimates of frequency and impact , 2010 .
[77] Pritika Mehra,et al. A brief study and comparison of Snort and Bro Open Source Network Intrusion Detection Systems , 2012 .
[78] Per Larsen,et al. Large-Scale Automated Software Diversity—Program Evolution Redux , 2017, IEEE Transactions on Dependable and Secure Computing.
[79] Mohsine Eleuldj,et al. OpenStack: Toward an Open-source Solution for Cloud Computing , 2012 .
[80] Stefan Rass,et al. Defending Against Advanced Persistent Threats Using Game-Theory , 2017, PloS one.
[81] Sanjay Jha,et al. A Survey of Securing Networks Using Software Defined Networking , 2015, IEEE Transactions on Reliability.
[82] S. Radack. The Common Vulnerability Scoring System (CVSS) , 2007 .
[83] Sylvia Ratnasamy,et al. A Survey of Enterprise Middlebox Deployments , 2012 .
[84] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
[85] Corbin Del Carlo. Intrusion detection evasion: How Attackers get past the burglar alarm , 2003 .
[86] Bharat K. Bhargava,et al. Mayflies: A Moving Target Defense Framework for Distributed Systems , 2016, MTD@CCS.
[87] Deep Medhi,et al. SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment , 2015, 2015 IEEE International Conference on Dependable Systems and Networks Workshops.
[88] Fei Li,et al. Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks , 2016, MTD@CCS.
[89] Wen Shen,et al. Spatial-Temporal Moving Target Defense: A Markov Stackelberg Game Model , 2020, AAMAS.
[90] Dijiang Huang,et al. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[91] Somesh Jha,et al. Two formal analyses of attack graphs , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[92] Scott A. DeLoach,et al. Mission-oriented moving target defense based on cryptographically strong network dynamics , 2013, CSIIRW '13.
[93] Sailik Sengupta,et al. Adaptive MTD Security using Markov Game Modeling , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).
[94] Dijiang Huang,et al. MTD Analysis and evaluation framework in Software Defined Network (MASON) , 2018, SDN-NFV@CODASPY.
[95] Michael E. Locasto,et al. Software Diversity: Security, Entropy and Game Theory , 2012, HotSec.
[96] Scott A. DeLoach,et al. Towards a Theory of Moving Target Defense , 2014, MTD '14.
[97] Omar Santos,et al. Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services , 2014 .
[98] Cheng Lei,et al. Moving Target Defense Techniques: A Survey , 2018, Secur. Commun. Networks.
[99] Min Zhu,et al. B4: experience with a globally-deployed software defined wan , 2013, SIGCOMM.
[100] Xiang Yu,et al. Applying Self-Shielding Dynamics to the Network Architecture , 2013, Moving Target Defense.
[101] Yevgeniy Vorobeychik,et al. Optimal randomized classification in adversarial settings , 2014, AAMAS.
[102] Jong Hyuk Park,et al. MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats , 2014, Symmetry.
[103] Haifeng Xu,et al. Deceiving Cyber Adversaries: A Game Theoretic Approach , 2018, AAMAS.
[104] Michael L. Littman,et al. Value-function reinforcement learning in Markov games , 2001, Cognitive Systems Research.
[105] Dijiang Huang,et al. SDN based Scalable MTD solution in Cloud Network , 2016, MTD@CCS.
[106] Michael B. Crouse,et al. Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses , 2015, MTD@CCS.
[107] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[108] Cheng Lei,et al. Optimal Strategy Selection for Moving Target Defense Based on Markov Game , 2017, IEEE Access.
[109] Michael P. Wellman,et al. Empirical Game-Theoretic Analysis for Moving Target Defense , 2015, MTD@CCS.
[110] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[111] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[112] Baosheng Wang,et al. RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[113] Scott A. DeLoach,et al. Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense | NIST , 2012 .
[114] Guanhua Yan,et al. Ensuring Deception Consistency for FTP Services Hardened against Advanced Persistent Threats , 2018, MTD@CCS.
[115] Dong Seong Kim,et al. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.
[116] Eric Eide,et al. Introducing CloudLab: Scientific Infrastructure for Advancing Cloud Architectures and Applications , 2014, login Usenix Mag..
[117] Minghui Zhu,et al. Comparing Different Moving Target Defense Techniques , 2014, MTD '14.
[118] Siv Hilde Houmb,et al. Quantifying security risk level from CVSS estimates of frequency and impact , 2010, J. Syst. Softw..
[119] Jin B. Hong,et al. Assessing the Effectiveness of Moving Target Defenses Using Security Models , 2016, IEEE Transactions on Dependable and Secure Computing.
[120] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[121] William W. Streilein,et al. Survey of Cyber Moving Target Techniques , 2013 .
[122] Sailik Sengupta,et al. Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks , 2018, ArXiv.
[123] P. Mell,et al. Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme , 2002 .
[124] Dijiang Huang,et al. Security policy checking in distributed SDN based clouds , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[125] Sailik Sengupta,et al. General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks , 2019, GameSec.
[126] Dijiang Huang,et al. TRUFL: Distributed Trust Management Framework in SDN , 2018, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[127] Yitzchak M. Gottlieb,et al. CyberVAN: A Cyber Security Virtual Assured Network testbed , 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference.
[128] Karen A. Scarfone,et al. A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .
[129] Thomas Narten,et al. IPv6 Stateless Address Autoconfiguration , 1996, RFC.
[130] Ping Chen,et al. A Study on Advanced Persistent Threats , 2014, Communications and Multimedia Security.
[131] Joseph G. Tront,et al. MT6D: A Moving Target IPv6 Defense , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[132] Jin B. Hong,et al. Scalable Security Models for Assessing Effectiveness of Moving Target Defenses , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[133] Jin B. Hong,et al. Performance Analysis of Scalable Attack Representation Models , 2013, SEC.
[134] Jin B. Hong,et al. Optimal Network Reconfiguration for Software Defined Networks Using Shuffle-Based Online MTD , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).
[135] Azer Bestavros,et al. Markov Modeling of Moving Target Defense Games , 2016, MTD@CCS.
[136] Xinming Ou,et al. Identifying Critical Attack Assets in Dependency Attack Graphs , 2008, ESORICS.
[137] Sjouke Mauw,et al. Foundations of Attack Trees , 2005, ICISC.
[138] Richard Ford,et al. Heartbleed 101 , 2014, IEEE Security & Privacy.
[139] Richard Colbaugh,et al. Predictability-oriented defense against adaptive adversaries , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).
[140] Milind Tambe,et al. From physical security to cybersecurity , 2015, J. Cybersecur..
[141] Harry G. Perros,et al. SDN-based solutions for Moving Target Defense network protection , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[142] Wei Hu,et al. Moving target defense: state of the art and characteristics , 2016, Frontiers of Information Technology & Electronic Engineering.
[143] Scott A. DeLoach,et al. MTD CBITS: Moving Target Defense for Cloud-Based IT Systems , 2017, ESORICS.
[144] D. Fudenberg,et al. Digitized by the Internet Archive in 2011 with Funding from Working Paper Department of Economics the Folk Theorem with Imperfect Public Information , 2022 .
[145] Bhakti Bohara. Moving Target Defense Using Live Migration of Docker Containers , 2017 .
[146] Sailik Sengupta,et al. A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications , 2017, AAMAS.
[147] Sushil Jajodia,et al. An Attack Graph-Based Probabilistic Security Metric , 2008, DBSec.
[148] Ralph Langner,et al. Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.
[149] Yulong Wang,et al. U-TRI: Unlinkability Through Random Identifier for SDN Network , 2017, MTD@CCS.
[150] Quanyan Zhu,et al. GADAPT: A Sequential Game-Theoretic Framework for Designing Defense-in-Depth Strategies Against Advanced Persistent Threats , 2016, GameSec.
[151] Dhishan Dhammearatchi,et al. Next-Generation Firewalls , 2016 .
[152] Florian Skopik,et al. Combating advanced persistent threats: From network event correlation to incident detection , 2015, Comput. Secur..
[153] Danilo Gligoroski,et al. Bypassing Data Execution Prevention on MicrosoftWindows XP SP2 , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[154] Akihiro Nakao,et al. GENI: A federated testbed for innovative network experiments , 2014, Comput. Networks.
[155] Angelos Stavrou,et al. MOTAG: Moving Target Defense against Internet Denial of Service Attacks , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[156] Aswin Chidambaram Pappa. Moving target defense for securing smart grid communications: Architectural design, implementation and evaluation , 2016 .
[157] Jin B. Hong,et al. A survey on the usability and practical applications of Graphical Security Models , 2017, Comput. Sci. Rev..
[158] Ratul Mahajan,et al. Measuring ISP topologies with Rocketfuel , 2004, IEEE/ACM Transactions on Networking.
[159] Laurent Vanbever,et al. NetHide: Secure and Practical Network Topology Obfuscation , 2018, USENIX Security Symposium.
[160] William W. Streilein,et al. Finding Focus in the Blur of Moving-Target Techniques , 2014, IEEE Security & Privacy.
[161] Jin B. Hong,et al. Scalable Security Model Generation and Analysis Using k-importance Measures , 2013, SecureComm.
[162] Richard Colbaugh,et al. Web Analytics for Security Informatics , 2011, 2011 European Intelligence and Security Informatics Conference.
[163] Dijiang Huang,et al. A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities , 2019, IEEE Communications Surveys & Tutorials.
[164] Ehab Al-Shaer,et al. Random Host Mutation for Moving Target Defense , 2012, SecureComm.
[165] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[166] Dijiang Huang,et al. S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks , 2019, RAID.
[167] Dijiang Huang,et al. Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments , 2017, SDN-NFV@CODASPY.
[168] Julian Jang,et al. Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[169] Kemal Akkaya,et al. Mitigating Crossfire Attacks Using SDN-Based Moving Target Defense , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).
[170] Martin J. Osborne,et al. An Introduction to Game Theory , 2003 .