Moving Target Defense for Distributed Systems

Moving Target Defense for Distributed Systems PDF Author: Todd Perez
Publisher: Createspace Independent Publishing Platform
ISBN: 9781984966063
Category :
Languages : en
Pages : 82

Get Book Here

Book Description
Designed for researchers and practitioners, Moving Target Defense for Distributed Systems enables readers to understand the potential of MTD capabilities. It enables defenders to change system or network behaviors, policies, and configurations automatically to keep potential attack surfaces protected. Advanced level students in computer science, especially those interested in networks and security, will benefit from this book.Since these models can be used as a security metric the authors include different network configurations and policies, consider the similarity and dissimilarity of network resources, and account for minimum impact to maximum impact attacks. Also offered is a framework for determining the cost of MTD-based VM migration on cloud data centers.

Moving Target Defense for Distributed Systems

Moving Target Defense for Distributed Systems PDF Author: Sachin Shetty
Publisher: Springer
ISBN: 3319310321
Category : Computers
Languages : en
Pages : 92

Get Book Here

Book Description
This book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems. It presents MTD-based research efforts to protect cloud data centers, along with network and security risk-aware approaches to place Virtual Machines (VM) in cloud data centers. These approaches include MTD-based network diversity models that enable an evaluation of the robustness of cloud data centers against potential zero-day attacks. Since these models can be used as a security metric the authors include different network configurations and policies, consider the similarity and dissimilarity of network resources, and account for minimum impact to maximum impact attacks. Also offered is a framework for determining the cost of MTD-based VM migration on cloud data centers. Designed for researchers and practitioners, Moving Target Defense for Distributed Systems enables readers to understand the potential of MTD capabilities. It enables defenders to change system or network behaviors, policies, and configurations automatically to keep potential attack surfaces protected. Advanced level students in computer science, especially those interested in networks and security, will benefit from this book.

Moving Target Defense for Distributed Systems

Moving Target Defense for Distributed Systems PDF Author: Todd Perez
Publisher: Createspace Independent Publishing Platform
ISBN: 9781984966063
Category :
Languages : en
Pages : 82

Get Book Here

Book Description
Designed for researchers and practitioners, Moving Target Defense for Distributed Systems enables readers to understand the potential of MTD capabilities. It enables defenders to change system or network behaviors, policies, and configurations automatically to keep potential attack surfaces protected. Advanced level students in computer science, especially those interested in networks and security, will benefit from this book.Since these models can be used as a security metric the authors include different network configurations and policies, consider the similarity and dissimilarity of network resources, and account for minimum impact to maximum impact attacks. Also offered is a framework for determining the cost of MTD-based VM migration on cloud data centers.

Moving Target Defense for Distributed Systems

Moving Target Defense for Distributed Systems PDF Author: Carl Aguilar
Publisher: Createspace Independent Publishing Platform
ISBN: 9781984360212
Category :
Languages : en
Pages : 82

Get Book Here

Book Description
Moving Target Defense for Distributed Systems presents MTD-based research efforts to protect cloud data centers, along with network and security risk-aware approaches to place Virtual Machines (VM) in cloud data centers. These approaches include MTD-based network diversity models that enable an evaluation of the robustness of cloud data centers against potential zero-day attacks. Since these models can be used as a security metric the authors include different network configurations and policies, consider the similarity and dissimilarity of network resources, and account for minimum impact to maximum impact attacks. Also offered is a framework for determining the cost of MTD-based VM migration on cloud data centers.

Moving Target Defense

Moving Target Defense PDF Author: Sushil Jajodia
Publisher: Springer Science & Business Media
ISBN: 1461409772
Category : Computers
Languages : en
Pages : 196

Get Book Here

Book Description
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Modeling and Design of Secure Internet of Things

Modeling and Design of Secure Internet of Things PDF Author: Charles A. Kamhoua
Publisher: John Wiley & Sons
ISBN: 1119593360
Category : Technology & Engineering
Languages : en
Pages : 704

Get Book Here

Book Description
An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book: Presents information on game-theory analysis of cyber deception Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation Contains contributions from an international panel of experts Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities Written for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.

Moving Target Defense II

Moving Target Defense II PDF Author: Sushil Jajodia
Publisher: Springer Science & Business Media
ISBN: 1461454166
Category : Computers
Languages : en
Pages : 210

Get Book Here

Book Description
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference.

Industrial Control Systems Security and Resiliency

Industrial Control Systems Security and Resiliency PDF Author: Craig Rieger
Publisher: Springer Nature
ISBN: 3030182142
Category : Computers
Languages : en
Pages : 276

Get Book Here

Book Description
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission’s survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.

Information Security and Privacy Research

Information Security and Privacy Research PDF Author: Dimitris Gritzalis
Publisher: Springer
ISBN: 9783642448928
Category : Computers
Languages : en
Pages : 0

Get Book Here

Book Description
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.

Optimal Planning and Operation of Moving Target Defense for Detecting False Data Injection Attacks in Smart Grids

Optimal Planning and Operation of Moving Target Defense for Detecting False Data Injection Attacks in Smart Grids PDF Author: Bo Liu
Publisher:
ISBN:
Category :
Languages : en
Pages : 0

Get Book Here

Book Description
Moving target defense (MTD) in the power system is a promising defense strategy to detect false data injection (FDI) attacks against state estimation by using distributed flexible AC transmission system (D-FACTS) devices. Optimal planning and operation are two essential stages in the MTD application. MTD planning determines the optimal allocation of D-FACTS devices, while MTD operation decides the optimal D-FACTS setpoints under different load conditions in real-time. However, most MTD works focus on studying the MTD operation methods and neglect MTD planning. It is generally assumed that all lines are equipped with D-FACTS devices, which is the most expensive MTD planning solution. This dissertation separates MTD planning and MTD operation as two independent problems by distinguishing their roles in attack detection effectiveness, MTD application costs, and MTD hiddenness. The contributions of this work are three-fold as follows. Firstly, this dissertation proves that MTD planning can determine the MTD detection effectiveness, regardless of D-FACTS device setpoints in MTD operation. This work designs max-rank MTD planning algorithms by using the minimum number of D-FACTS devices to ensure MTD detection effectiveness and minimize the MTD planning cost. It is proved that any MTDs under proposed planning algorithms have the maximum rank of its composite matrix, a widely used metric of the MTD detection effectiveness. In addition, this work further points out the maximum rank of the composite matrix is not strictly equivalent to maximal MTD detection effectiveness. Three types of unprotected buses in MTD are identified, and attack detecting probability (ADP) is introduced as a novel metric for measuring the detection effectiveness of MTD planning. It is proved that the rank of the composite matrix merely represents the lower bound of ADP, while the number of unprotected buses determines the upper bound of ADP. Then, a novel graph-theory-based planning algorithm is proposed to achieve maximal MTD detection effectiveness. Secondly, this dissertation highlights that MTD operation ought to focus on reducing the MTD operation cost. This work proposes an AC optimal power flow (ACOPF) model considering D-FACTS devices as an MTD operation model, in which the reactance of D-FACTS equipped lines are introduced as decision variables to minimize system losses and generation costs. The proposed model can be used by system operators to achieve economic and cybersecure system operations. In addition, this dissertation rigorously derives the gradient and Hessian matrices of the objective function and constraints with respect to line reactance, which are further used to build an interior-point solver of the proposed ACOPF model. Finally, this dissertation designs the optimal planning and operation of D-FACTS devices for hidden MTD (HMTD), which is a superior MTD method stealthy to sophisticated attackers. A depth-first-search-based MTD planning algorithm is proposed to guarantee the MTD hiddenness while maximizing the rank of its composite matrix and covering all necessary buses. Additionally, this work proposes DC- and AC-HMTD operation models to determine the setpoints of D-FACTS devices. The optimization-based DC-HMTD model outperforms the existing HMTD operation in terms of CPU time and detection effectiveness. The ACOPF-based HMTD operation model ensures the hiddenness and minimizes the generation cost to utilize the economic benefits of D-FACTS devices. Comparative numerical results on multiple systems show the efficacy of the proposed planning and operation approaches in achieving high detecting effectiveness and MTD hiddenness.

A Theory for Understanding and Quantifying Moving Target Defense

A Theory for Understanding and Quantifying Moving Target Defense PDF Author: Rui Zhuang
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description
The static nature of cyber systems gives attackers a valuable and asymmetric advantage - time. To eliminate this asymmetric advantage, a new approach, called Moving Target Defense (MTD) has emerged as a potential solution. MTD system seeks to proactively change system configurations to invalidate the knowledge learned by the attacker and force them to spend more effort locating and re-locating vulnerabilities. While it sounds promising, the approach is so new that there is no standard definition of what an MTD is, what is meant by diversification and randomization, or what metrics to define the effectiveness of such systems. Moreover, the changing nature of MTD violates two basic assumptions about the conventional attack surface notion. One is that the attack surface remains unchanged during an attack and the second is that it is always reachable. Therefore, a new attack surface definition is needed. To address these issues, I propose that a theoretical framework for MTD be defined. The framework should clarify the most basic questions such as what an MTD system is and its properties such as adaptation, diversification and randomization. The framework should reveal what is meant by gaining and losing knowledge, and what are different attack types. To reason over the interactions between attacker and MTD system, the framework should define key concepts such as attack surface, adaptation surface and engagement surface. Based on that, this framework should allow MTD system designers to decide how to use existing configuration choices and functionality diversification to increase security. It should allow them to analyze the effectiveness of adapting various combinations of different configuration aspects to thwart different types of attacks. To support analysis, the frame- work should include an analytical model that can be used by designers to determine how different parameter settings will impact system security.