Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense

09/12/2019
by   Jin-Hee Cho, et al.
0

Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. However, the nature of reactive security mechanisms has limitations because potential attackers cannot be prevented in advance. We are facing a reality with the proliferation of persistent, advanced, intelligent attacks while defenders are often way behind attackers in taking appropriate actions to thwart potential attackers. The concept of moving target defense (MTD) has emerged as a proactive defense mechanism aiming to prevent attacks. In this work, we conducted a comprehensive, in-depth survey to discuss the following aspects of MTD: key roles, design principles, classifications, common attacks, key methodologies, important algorithms, metrics, evaluation methods, and application domains. We discuss the pros and cons of all aspects of MTD surveyed in this work. Lastly, we highlight insights and lessons learned from this study and suggest future work directions. The aim of this paper is to provide the overall trends of MTD research in terms of critical aspects of defense systems for researchers who seek for developing proactive, adaptive MTD mechanisms.

READ FULL TEXT

page 19

page 24

page 26

page 28

page 29

research
08/01/2019

Modeling and Analysis of Integrated Proactive Defense Mechanisms for Internet-of-Things

As a solution to protect and defend a system against inside attacks, man...
research
03/01/2023

DOLOS: A Novel Architecture for Moving Target Defense

Moving Target Defense and Cyber Deception emerged in recent years as two...
research
07/16/2020

Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey

Diversity-based security approaches have been studied for several decade...
research
02/24/2020

Spatial-Temporal Moving Target Defense: A Markov Stackelberg Game Model

Moving target defense has emerged as a critical paradigm of protecting a...
research
07/14/2023

Evaluation Methodologies in Software Protection Research

Man-at-the-end (MATE) attackers have full control over the system on whi...
research
01/09/2018

A Survey among Network Operators on BGP Prefix Hijacking

BGP prefix hijacking is a threat to Internet operators and users. Severa...
research
09/18/2019

Analyzing Root Causes of Intrusion Detection False-Negatives: Methodology and Case Study

Intrusion Detection Systems (IDSs) are a necessary cyber defense mechani...

Please sign up or login with your details

Forgot password? Click here to reset