Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2459976.2460045acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Moving target defense (MTD) in an adaptive execution environment

Published: 08 January 2013 Publication History

Abstract

This paper describes how adaptation support facilitated by an execution environment can be used to implement moving target defenses (MTD). Reactive and proactive use of adaptation, although beneficial for cyber defense, comes with additional cost, and therefore needs to be employed selectively. We also describe the pros and cons of using reactive and proactive adaptation for MTD for a representative sample of adaptations supported by an execution environment that we are developing.

References

[1]
M. Atighetchi, P. Pal et al., "Adaptive Cyberdefense for Survival and Intrusion Tolerance," IEEE Internet Computing, vol. 8, no. 6, pp. 25--33, Nov/Dec 2004
[2]
P. Pal, P. Rubel et al., "An architecture for adaptive intrusion-tolerant applications," Software: Practice and Experience, vol. 36, no. 11-12, pp 1331--1354, Sep/Oct 2006
[3]
Chapter 9: Data Communications, Cybersecurity and Information Privacy, In The Future of the Electric Grid, Massachusetts Institute of Technology, 2011
[4]
P. Pal, R. Schantz, A. Paulos, J. Regehr, M. Hibler. "Advanced Adaptive Application (A3) Environment: initial experience," Proc. of the Middleware 2011 Industry Track, ACM, New York, NY, USA, 2011
[5]
A. Paulos et al., "On the Feasibility of an Execution Environment for Adaptive Defenses against Attacks," submitted for publication, 2012
[6]
CVE - CVE-2011-2369. Web. Retrieved 15 August 2012. <cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2369>
[7]
H. Sacham, "The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)," Proc. of CCS 2007, pp 55--61. ACM Press, Oct. 2007
[8]
PaX Team, Documentation for the PaX project, Address space layout randomization. Web. Retrieved 15 August 2012,<http://pax.grsecurity.net/docs/aslr.txt>.
[9]
M. Franz, "E unibus pluram: massive-scale software diversity as a defense mechanism," Proc. of NSPW 2010, pp. 7--16. ACM Press. 2010

Cited By

View all
  • (2021)Repeatable Experimentation for Cybersecurity Moving Target DefenseSecurity and Privacy in Communication Networks10.1007/978-3-030-90019-9_5(82-99)Online publication date: 3-Nov-2021
  • (2018)A Survey of Security Models Using Effective Moving Target DefensesInternational Journal of Information Security and Privacy10.4018/IJISP.201807010712:3(123-140)Online publication date: 1-Jul-2018
  • (2018)Moving Target Defense TechniquesSecurity and Communication Networks10.1155/2018/37596262018Online publication date: 22-Jul-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
January 2013
282 pages
ISBN:9781450316873
DOI:10.1145/2459976

Sponsors

  • Los Alamos National Labs: Los Alamos National Labs
  • Sandia National Labs: Sandia National Laboratories
  • DOE: Department of Energy
  • Oak Ridge National Laboratory
  • Lawrence Livermore National Lab.: Lawrence Livermore National Laboratory
  • BERKELEYLAB: Lawrence National Berkeley Laboratory
  • Argonne Natl Lab: Argonne National Lab
  • Idaho National Lab.: Idaho National Laboratory
  • Pacific Northwest National Laboratory
  • Nevada National Security Site: Nevada National Security Site

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 January 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cost
  2. moving target defense
  3. proactive and reactive adaptation

Qualifiers

  • Research-article

Conference

CSIIRW '13
Sponsor:
  • Los Alamos National Labs
  • Sandia National Labs
  • DOE
  • Lawrence Livermore National Lab.
  • BERKELEYLAB
  • Argonne Natl Lab
  • Idaho National Lab.
  • Nevada National Security Site
CSIIRW '13: Cyber Security and Information Intelligence
January 8 - 10, 2013
Tennessee, Oak Ridge, USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)6
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Repeatable Experimentation for Cybersecurity Moving Target DefenseSecurity and Privacy in Communication Networks10.1007/978-3-030-90019-9_5(82-99)Online publication date: 3-Nov-2021
  • (2018)A Survey of Security Models Using Effective Moving Target DefensesInternational Journal of Information Security and Privacy10.4018/IJISP.201807010712:3(123-140)Online publication date: 1-Jul-2018
  • (2018)Moving Target Defense TechniquesSecurity and Communication Networks10.1155/2018/37596262018Online publication date: 22-Jul-2018
  • (2017)Scalable Node-Centric Route Mutation for Defense of Large-Scale Software-Defined NetworksSecurity and Communication Networks10.1155/2017/46513952017Online publication date: 1-Jan-2017
  • (2017)Node-centric route mutation for large-scale SDN based on 3D earth mover's distance model2017 17th International Symposium on Communications and Information Technologies (ISCIT)10.1109/ISCIT.2017.8261239(1-6)Online publication date: Sep-2017
  • (2016)Assessing the Effectiveness of Moving Target Defenses Using Security ModelsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2015.244379013:2(163-177)Online publication date: 1-Mar-2016
  • (2014)Managed Execution Environment as a Moving-Target Defense InfrastructureIEEE Security & Privacy10.1109/MSP.2013.13312:2(51-59)Online publication date: Mar-2014
  • (2014)Scalable Security Models for Assessing Effectiveness of Moving Target DefensesProceedings of the 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks10.1109/DSN.2014.54(515-526)Online publication date: 23-Jun-2014

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media