A Survey of Security Models Using Effective Moving Target Defenses
This article describes how nowadays, attackers are targeting valuable assets and infrastructures in networked systems causing an impact on enterprises and individuals. By implementing moving target defenses helps to prevent cyber-attacks by changing the attack surface. Some security models like Attack Graph (A.G) and Attack Tree (A.T) provide a formal method to access and compare the effectiveness of them. So, in this article, the authors incorporate moving target defenses in a security model, using a Hierarchical Attack Representation Model (HARM), to compare and access the effectiveness of the security. In addition, the authors are also taking important measures (IMs) for implementing MTD techniques to enhance the scalability of the network. Finally, they compare the scalability of an attack graph and HARM models by implementing MTD techniques to find the effectiveness of security in network.