Assessing the Effectiveness of Moving Target Defenses Using Security Models
暂无分享,去创建一个
[1] Michael B. Crouse,et al. A moving target environment for computer configurations using Genetic Algorithms , 2011, 2011 4th Symposium on Configuration Analytics and Automation (SAFECONFIG).
[2] Scott A. DeLoach,et al. Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense | NIST , 2012 .
[3] R. Sawilla,et al. Partial cuts in attack graphs for cost effective network defence , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[4] Salim Hariri,et al. Resilient Dynamic Data Driven Application Systems (rDDDAS) , 2013, ICCS.
[5] D. Dzung,et al. Selecting a Standard Redundancy Method for Highly Available Industrial Networks , 2006, 2006 IEEE International Workshop on Factory Communication Systems.
[6] Boudewijn R. Haverkort,et al. Performance and reliability analysis of computer systems: An example-based approach using the sharpe software package , 1998 .
[7] Sushil Jajodia,et al. k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks , 2010, ESORICS.
[8] Jin B. Hong,et al. Scalable security analysis in hierarchical attack representation model using centrality measures , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).
[9] Dijiang Huang,et al. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[10] Andrew W. Appel,et al. MulVAL: A Logic-based Network Security Analyzer , 2005, USENIX Security Symposium.
[11] Pratyusa K. Manadhata,et al. Game Theoretic Approaches to Attack Surface Shifting , 2013, Moving Target Defense.
[12] Scott A. DeLoach,et al. Mission-oriented moving target defense based on cryptographically strong network dynamics , 2013, CSIIRW '13.
[13] Richard Lippmann,et al. Practical Attack Graph Generation for Network Defense , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[14] Evangelos P. Markatos,et al. Defending against hitlist worms using network address space randomization , 2005, WORM '05.
[15] Jin B. Hong,et al. Scalable Attack Representation Model Using Logic Reduction Techniques , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[16] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .
[17] Angelos Stavrou,et al. MOTAG: Moving Target Defense against Internet Denial of Service Attacks , 2013, 2013 22nd International Conference on Computer Communication and Networks (ICCCN).
[18] Jin B. Hong,et al. HARMs: Hierarchical Attack Representation Models for Network Security Analysis , 2012, AISM 2012.
[19] Sushil Jajodia,et al. An efficient approach to assessing the risk of zero-day vulnerabilities , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[20] Somesh Jha,et al. Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[21] Yulong Zhang,et al. Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds , 2012, SEC.
[22] Dong Seong Kim,et al. Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees , 2012, Secur. Commun. Networks.
[23] Richard Lippmann,et al. Modeling Modern Network Attacks and Countermeasures Using Attack Graphs , 2009, 2009 Annual Computer Security Applications Conference.
[24] Scott A. DeLoach,et al. Investigating the application of moving target defenses to network security , 2013, 2013 6th International Symposium on Resilient Control Systems (ISRCS).
[25] Yih Huang,et al. Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services , 2011, Moving Target Defense.
[26] Abdul Jabbar,et al. Path diversification for future internet end-to-end resilience and survivability , 2014, Telecommun. Syst..
[27] David Evans,et al. N-Variant Systems: A Secretless Framework for Security through Diversity , 2006, USENIX Security Symposium.
[28] Sushil Jajodia,et al. k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities , 2014, IEEE Transactions on Dependable and Secure Computing.
[29] Chao Yang,et al. NOMAD: Towards non-intrusive moving-target defense against web bots , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[30] Xinming Ou,et al. A scalable approach to attack graph generation , 2006, CCS '06.
[31] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[32] Bradley R. Schmerl,et al. Architecture-based self-protecting software systems , 2013, QoSA '13.
[33] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[34] Fei Li,et al. Catch Me If You Can: A Cloud-Enabled DDoS Defense , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[35] Laurent Gallon,et al. Using CVSS in Attack Graphs , 2011, 2011 Sixth International Conference on Availability, Reliability and Security.
[36] Jin B. Hong,et al. Scalable Security Models for Assessing Effectiveness of Moving Target Defenses , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[37] Jin B. Hong,et al. Performance Analysis of Scalable Attack Representation Models , 2013, SEC.
[38] Jin B. Hong,et al. Scalable Security Model Generation and Analysis Using k-importance Measures , 2013, SecureComm.
[39] Ghassan O. Karame,et al. Enabling secure VM-vTPM migration in private clouds , 2011, ACSAC '11.
[40] Jack W. Davidson,et al. Security through redundant data diversity , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[41] Valentina Casola,et al. A moving target defense approach for protecting resource-constrained distributed devices , 2013, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI).
[42] Richard P. Lippmann,et al. An Annotated Review of Past Papers on Attack Graphs , 2005 .
[43] Ümit V. Çatalyürek,et al. Shattering and Compressing Networks for Centrality Analysis , 2012, ArXiv.
[44] Michael Franz,et al. Compiler-Generated Software Diversity , 2011, Moving Target Defense.
[45] Cristina Nita-Rotaru,et al. Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes , 2013, IEEE Transactions on Dependable and Secure Computing.
[46] Sami S. Al-Wakeel,et al. PRSA: A Path Redundancy Based Security Algorithm for Wireless Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[47] Atul Prakash,et al. Distilling critical attack graph surface iteratively through minimum-cost SAT solving , 2011, ACSAC '11.
[48] Arun K. Sood,et al. Closing cluster attack windows through server redundancy and rotations , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).
[49] Brett Benyo,et al. Moving target defense (MTD) in an adaptive execution environment , 2013, CSIIRW '13.
[50] Vyacheslav S. Kharchenko,et al. Using Inherent Service Redundancy and Diversity to Ensure Web Services Dependability , 2009, Methods, Models and Tools for Fault Tolerance.
[51] Hamed Okhravi,et al. Creating a Cyber Moving Target for Critical Infrastructure Applications , 2011, Critical Infrastructure Protection.
[52] Sharon E. Perl,et al. Myriad: Cost-Effective Disaster Tolerance , 2002, FAST.
[53] Anh Nguyen-Tuong,et al. Effectiveness of Moving Target Defenses , 2011, Moving Target Defense.
[54] Jack W. Davidson,et al. Security through Diversity: Leveraging Virtual Machine Technology , 2009, IEEE Security & Privacy.