Published: June 11, 2012
Author(s)
Rui Zhuang, Su Zhang, Scott DeLoach, Xinming Ou, Anoop Singhal
Conference
Name: National Symposium on Moving Target Research
Dates: June 11, 2012
Location: Annapolis, Maryland, United States
Announcement
Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network’s configuration can increase the difficulty for attackers and thus improve the resilience of the system under attack. In this paper we present a basic design schema of a moving-target network defense system. Based on this design schema, we conducted a simulation-based study to investigate the degree to which proactively changing a network’s various parameters can decrease an adversary’s chance for success. We believe this is an important first step towards understanding why and how the concept of a moving target can be successfully applied to computer network defenses.
Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network’s configuration can increase the difficulty for attackers and thus improve the...
See full abstract
Moving-target defense has been hypothesized as a potential game changer in cyber defense, including that for computer networks. However there has been little work to study how much proactively changing a network’s configuration can increase the difficulty for attackers and thus improve the resilience of the system under attack. In this paper we present a basic design schema of a moving-target network defense system. Based on this design schema, we conducted a simulation-based study to investigate the degree to which proactively changing a network’s various parameters can decrease an adversary’s chance for success. We believe this is an important first step towards understanding why and how the concept of a moving target can be successfully applied to computer network defenses.
Hide full abstract
Keywords
intrusion tolerance; security metrics; security risk; threats
Control Families
None selected