Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








20,483 Hits in 5.7 sec

A moving target defense approach for protecting resource-constrained distributed devices

Valentina Casola, Alessandra De Benedictis, Massimiliano Albanese
2013 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI)  
In this paper, we propose an MTD approach for protecting resource-constrained distributed devices through fine-grained reconfiguration at different architectural layers.  ...  Techniques aimed at continuously changing a system's attack surface, usually referred to as Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks.  ...  Conclusions In this paper, we have proposed an MTD approach for protecting resource-constrained distribute devices. The proposed approach is based on fine-grained reconfiguration at Figure 6 .  ... 
doi:10.1109/iri.2013.6642449 dblp:conf/iri/CasolaBA13 fatcat:o3shtvxnrfbkbjufnmlozvy6gi

A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices [chapter]

Valentina Casola, Alessandra De Benedictis, Massimiliano Albanese
2014 Advances in Intelligent Systems and Computing  
In this paper, we propose an MTD approach for protecting resource-constrained distributed devices through fine-grained reconfiguration at different architectural layers.  ...  Techniques aimed at continuously changing a system's attack surface, usually referred to as Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks.  ...  Fig. 8 Conclusions In this paper, we have proposed an MTD approach for protecting resource-constrained distribute devices.  ... 
doi:10.1007/978-3-319-04717-1_14 fatcat:6bacztvxevhqfn3am7l3gl63fm

Modelling Cost-Effectiveness of Defenses in Industrial Control Systems [chapter]

Andrew Fielder, Tingting Li, Chris Hankin
2016 Lecture Notes in Computer Science  
Through the development of optimal defense strategy, it is possible to identify when each specific defensive strategies is most appropriate; where the optimal defensive strategy depends on the resources  ...  The aim is to identify the appropriate deployment of a specific defensive strategy, such as defense-in-depth or critical component defense.  ...  A typical example of such ICS is Distributed Control Systems (DCS) that has high requirements on timeliness, availability and with very constrained resource, all of which make the defensive efforts in  ... 
doi:10.1007/978-3-319-45477-1_15 fatcat:ho6ymyhv2zdtrmt2w4xe2nbwfe

Cyber Resiliency Engineering Overview of the Architectural Assessment Process

Deborah J. Bodeau, Richard D. Graubart, Ellen R. Laderman
2014 Procedia Computer Science  
Dynamic Positioning: use distributed processing and dynamic relocation of critical assets and sensors Asset positioning: How extensively is a moving target defense strategy applied to critical assets?  ...  Analyze and address trade off between encryption and monitoring Coordinated Defense Apply defense in depth, moving away from a "hard outside, soft chewy center" Coordinate SOPs, particularly for  ...  Application Domain / Layer with examples Related Resilience Approaches  ... 
doi:10.1016/j.procs.2014.03.100 fatcat:zoses3erbjbivg26tdrpmf6uvy

Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid

Matthew Sherburne, Randy Marchany, Joseph Tront
2014 Proceedings of the 9th Annual Cyber and Information Security Research Conference on - CISR '14  
This research aims in providing a moving-target defense for wireless sensor networks while maintaining power efficiency within the network.  ...  We propose adapting Moving-Target IPv6 Defense for use with 6LoWPAN in order to defend against network-side attacks such as Denial-of-Service and Man-In-The-Middle while maintaining anonymity of client-server  ...  Moving Target IPv6 Defense Researchers from Virginia Tech, M.  ... 
doi:10.1145/2602087.2602107 dblp:conf/csiirw/SherburneMT14 fatcat:xjhkcgguh5a75j7oaav4hmncqu

Defense as a Service Cloud for Cyber-Physical Systems

Mohamed Azab, Mohamed Eltoweissy
2011 Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing  
a moving target defense.  ...  CyPhyCARD is designed to increase the cost for the attacker at all times through persistently asymmetric operations achieved, in part, using a moving target defense construction and automated recovery  ...  The moving target approach: CyPhyCARD is a software-based defense cloud designed to provision defense services to mission critical CPS.  ... 
doi:10.4108/icst.collaboratecom.2011.247118 dblp:conf/colcom/AzabE11 fatcat:oaucgz457rdjroarroz7rn4aea

Editorial: Third Quarter 2020 IEEE Communications Surveys and Tutorials

Ying-Dar Lin
2020 IEEE Communications Surveys and Tutorials  
In the context of Moving Target Defenses, the paper titled "A Survey of Moving Target Defenses for Network Security" by Sailik Sengupta, Ankur Chowdhary, Adel Alshamrani, Abdulhakim Sabur, and Subbarao  ...  The future of IoT will have a deep economical, commercial, and social impact on our lives. However, the resource-constrained nodes in IoT networks are luring targets for cyber-attacks.  ... 
doi:10.1109/comst.2020.3013455 fatcat:yd5pyfudirebrlzgxfncrxdwna

The SDN Shuffle

Douglas C. MacFarland, Craig A. Shue
2015 Proceedings of the Second ACM Workshop on Moving Target Defense - MTD '15  
While moving target systems are a topic of robust research, we find that prior work in network-based moving target defenses has limitations in either scalability or the ability to protect public servers  ...  In this work, we present a new moving target defense using software-defined networking (SDN) that can service unmodified clients while avoiding scalability limitations.  ...  This is particularly important for a security approach where adversaries may intentionally try to induce a denial of service condition by targeting resource-constrained infrastructure.  ... 
doi:10.1145/2808475.2808485 dblp:conf/ccs/MacFarlandS15 fatcat:qie7bnfvbbdbjll2qnrrcgvbcy

TRENDS, TECHNOLOGIES, AND FUTURE CHALLENGES IN WIRELESS SENSOR NETWORK'S

Putri Kevin, Dian Viely
2021 International Journal of Innovative Research in Engineering & Management  
This paper concludes by exploring results from different research in sensor network algorithms, localized algorithms and directed diffusion, distributed tracking in wireless ad hoc networks, and distributed  ...  The resulting DNS had to deal with distributed computing support and signal processing, tracking Distributed acoustic system was chosen for demonstration as a target problem.  ...  Distributed Sensor Program in Defense Modern research on DNS started in 1980 by DARPA.  ... 
doi:10.21276/ijirem.2021.8.5.4 fatcat:wnbordsj5bh4tabhchhn6a2k2m

Defending Embedded Systems with Software Symbiotes [chapter]

Ang Cui, Salvatore J. Stolfo
2011 Lecture Notes in Computer Science  
The use of Symbiotes represents a practical and effective protection mechanism for a wide range of devices, especially widely deployed, unprotected, legacy embedded devices.  ...  Little to no defensive technology, such as AV scanners or IDS's, are available to protect these devices.  ...  Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon.  ... 
doi:10.1007/978-3-642-23644-0_19 fatcat:sny5a66h3ncwdgfnn27qmio25e

Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense [article]

Jin-Hee Cho, Dilli P. Sharma, Hooman Alavizadeh, Seunghyun Yoon, Noam Ben-Asher, Terrence J. Moore, Dong Seong Kim, Hyuk Lim, Frederica F. Nelson
2019 arXiv   pre-print
The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks.  ...  Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades.  ...  Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on.  ... 
arXiv:1909.08092v1 fatcat:wsycpvaqgzdcvboagxlbg5x6uu

A Survey on Secure and Private Federated Learning Using Blockchain: Theory and Application in Resource-constrained Computing [article]

Ervin Moore, Ahmed Imteaj, Shabnam Rezapour, M. Hadi Amini
2023 arXiv   pre-print
We comprehensively review variant blockchain mechanisms that are suitable for FL process and discuss their trade-offs for a limited resource budget.  ...  Further, we extensively analyze the cyber threats that could be observed in a resource-constrained FL environment, and how blockchain can play a key role to block those cyber attacks.  ...  Blockchain, a decentralized approach, offers additional security and resources for applications such as FL.  ... 
arXiv:2303.13727v1 fatcat:nwrlxlmvfjcaldvfoamyxe4tfu

Moving target defense: state of the art and characteristics

Gui-lin Cai, Bao-sheng Wang, Wei Hu, Tian-zuo Wang
2016 Frontiers of Information Technology & Electronic Engineering  
Moving target defense (MTD) has emerged as one of the game-changing themes to alter the asymmetric situation between attacks and defenses in cyber-security.  ...  Finally, we provide a number of observations for the future direction in this field, which can be helpful for subsequent researchers.  ...  The multi-layer MTD for protecting resource-constrained distributed devices attempts to protect resource-constrained devices through reconfiguring them at the security level or the physical layer at runtime  ... 
doi:10.1631/fitee.1601321 fatcat:a237eemsfjhsxjrar3fmwbmceu

A Review on Internet of Things for Defense and Public Safety

Paula Fraga-Lamas, Tiago Fernández-Caramés, Manuel Suárez-Albela, Luis Castedo, Miguel González-López
2016 Sensors  
The review characterizes the open challenges for a broad deployment and presents a research roadmap for enabling an affordable IoT for defense and PS.  ...  Its adoption has proven well suited for sectors that manage a large number of assets and coordinate complex and distributed processes.  ...  The OMA Device Management working group specifies protocols for the management of mobile devices in resource constrained environments [77].  ... 
doi:10.3390/s16101644 pmid:27782052 pmcid:PMC5087432 fatcat:vg4ybtb7qjfj3iuhnocr7pkdoa

Blockchain-Based Secured Access Control in an IoT System

Sultan Algarni, Fathy Eassa, Khalid Almarhabi, Abduallah Almalaise, Emad Albassam, Khalid Alsubhi, Mohammad Yamin
2021 Applied Sciences  
Access control is one of the major challenges currently addressed through centralized approaches that may rely on a third party and they are constrained by availability and scalability, which may result  ...  The main objective of the proposed solution is to build Blockchain Managers (BCMs) for securing IoT access control, as well as allowing for secure communication between local IoT devices.  ...  nature, constrained devices and defense against various security issues, such as single points of failure.  ... 
doi:10.3390/app11041772 fatcat:banim6a4djbwbedfvr7cbskrpq
« Previous Showing results 1 — 15 out of 20,483 results