Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing

Author(s):  
Hooman Alavizadeh ◽  
Julian Jang-Jaccard ◽  
Dong Seong Kim
IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Andres A. Mercado-Velazquez ◽  
Ponciano J. Escamilla-Ambrosio ◽  
Floriberto Ortiz-Rodriguez

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 15521-15536 ◽  
Author(s):  
Samuel Woo ◽  
Daesung Moon ◽  
Taek-Young Youn ◽  
Yousik Lee ◽  
Yongeun Kim

2017 ◽  
Vol 2017 ◽  
pp. 1-12 ◽  
Author(s):  
Zheng Zhao ◽  
Fenlin Liu ◽  
Daofu Gong

Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH) is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.


Sign in / Sign up

Export Citation Format

Share Document