In Principles of Security and Trust,, Frank Piessens and Luca Viganò (Eds.). Holger Hermanns, Julia Kr"amer, Jan Krvc ál, and Mariëlle Stoelinga.International Journal on Software Tools for Technology Transfer, Vol. ADTLang: a programming language approach to attack defense trees. René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Peter Gjøl Jensen, and Danny Bøgsted Poulsen.In Graphical Models for Security, Peng Liu, Sjouke Mauw, and Ketil Stolen (Eds.). Quantitative Evaluation of Attack Defense Trees Using Stochastic Timed Automata. René Rydhof Hansen, Peter Gjøl Jensen, Kim Guldstrand Larsen, Axel Legay, and Danny Bøgsted Poulsen.Federal Networking and Information Technology Research and Development, Washington. Moving target defense co-chair's report-National Cyber Leap Year Summit 2009. AK Ghosh, D Pendarakis, and WH Sanders.In Formal Modeling and Analysis of Timed Systems, Martin Fr"anzle and Nicolas Markey (Eds.). Modelling Attack-defense Trees Using Timed Automata. Olga Gadyatskaya, René Rydhof Hansen, Kim Guldstrand Larsen, Axel Legay, Mads Chr.In Decision and Game Theory for Security, Stefan Rass, Bo An, Christopher Kiekintveld, Fei Fang, and Stefan Schauer (Eds.). A Stackelberg Game and Markov Modeling of Moving Target Defense. Xiaotao Feng, Zizhan Zheng, Prasant Mohapatra, and Derya Cansever.Matthew Dunlop, Stephen Groat, William Urbanski, Randy Marchany, and Joseph Tront.In Tools and Algorithms for the Construction and Analysis of Systems, Christel Baier and Cesare Tinelli (Eds.). Alexandre David, Peter Gjøl Jensen, Kim Guldstrand Larsen, Marius Mikuvc ionis, and Jakob Haahr Taankvist.In Automated Technology for Verification and Analysis, Franck Cassez and Jean-Francc ois Raskin (Eds.). Jensen, Kim Guldstrand Larsen, Axel Legay, Didier Lime, Mathias Grund Sørensen, and Jakob H. Effectiveness of IP address randomization in decoy-based moving target defense. Andrew Clark, Kun Sun, and Radha Poovendran.In Decision and Game Theory for Security,, MHR Khouzani, Emmanouil Panaousis, and George Theodorakopoulos (Eds.). A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense. Andrew Clark, Kun Sun, Linda Bushnell, and Radha Poovendran.In Security and Privacy in Communications Networks and the Workshops. Modeling and detection of complex attacks. Bonsangue, Susanne Graf, and Willem-Paul de Roever (Eds.). In Formal Methods for Components and Objects, Frank S. Priced Timed Automata: Algorithms and Applications. Reasoning about Moving Target Defense in Attack Modeling Formalisms. Gabriel Ballot, Vadim Malvone, Jean Leneutre, and Etienne Borde.In Pacific Rim International Symposium on Dependable Computing. Moving Target Defense Strategy in Critical Embedded Systems: A Game-theoretic Approach. Maxime Ayrault, Étienne Borde, Ulrich Kühne, and Jean Leneutre.In Principles of Security and Trust,, Martín Abadi and Steve Kremer (Eds.). Florian Arnold, Holger Hermanns, Reza Pulungan, and Mariëlle Stoelinga.Defending against hitlist worms using network address space randomization. Spyros Antonatos, Periklis Akritidis, Evangelos P Markatos, and Kostas G Anagnostakis.Finally, we present some experimental results using Uppaal Stratego to demonstrate its applicability and relevance. Moreover, this is the first paper that considers the specificity of MTDs in the automatic analysis of attack modeling formalisms. For the first time, MTD activation frequencies are analyzed in a state-of-the-art DAG-based representation. Our contribution is a new DAG-based formalism for MTDs and its translation into a Price Timed Markov Decision Process to find the best activation frequencies against the attacker's time/cost optimal strategies. Attack modeling formalisms based on DAG are prominently used to specify these scenarios. Optimizing the MTD activation frequency is necessary to develop this defense mechanism when facing realistic, multi-step attack scenarios. This frequent change is costly and leads to a trade-off between misleading the attacker and disrupting the quality of service. Since 2009, Moving Target Defense (MTD) has become a new paradigm of defensive mechanism that frequently changes the state of the target system to confuse the attacker.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |