scholarly journals CAN ID Shuffling Technique (CIST): Moving Target Defense Strategy for Protecting In-Vehicle CAN

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 15521-15536 ◽  
Author(s):  
Samuel Woo ◽  
Daesung Moon ◽  
Taek-Young Youn ◽  
Yousik Lee ◽  
Yongeun Kim
IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Andres A. Mercado-Velazquez ◽  
Ponciano J. Escamilla-Ambrosio ◽  
Floriberto Ortiz-Rodriguez

2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Zheng Zhao ◽  
Fenlin Liu ◽  
Daofu Gong

Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH) is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.


2021 ◽  
pp. 101412
Author(s):  
Vitor A. Cunha ◽  
Daniel Corujo ◽  
Joao P. Barraca ◽  
Rui L. Aguiar

Sign in / Sign up

Export Citation Format

Share Document