메뉴 건너뛰기




Volumn 2014-November, Issue November, 2014, Pages 31-40

Towards a theory of moving target defense

Author keywords

Computer security; Moving target defense; Network security

Indexed keywords

ENTROPY; SECURITY OF DATA;

EID: 84937715103     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2663474.2663479     Document Type: Conference Paper
Times cited : (207)

References (31)
  • 1
    • 84890055624 scopus 로고    scopus 로고
    • Toward network configuration randomization for moving target defense
    • Springer
    • E. Al-Shaer. Toward network configuration randomization for moving target defense. In Moving Target Defense, pages 153-159. Springer, 2011.
    • (2011) Moving Target Defense , pp. 153-159
    • Al-Shaer, E.1
  • 2
    • 34250345531 scopus 로고    scopus 로고
    • Defending against hitlist worms using network address space randomization
    • S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. Defending against hitlist worms using network address space randomization. Computer Networks, 51(12):3471-3490, 2007.
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3471-3490
    • Antonatos, S.1    Akritidis, P.2    Markatos, E.P.3    Anagnostakis, K.G.4
  • 6
    • 85094324399 scopus 로고    scopus 로고
    • Modeling next generation configuration management tools
    • M. Burgess and A. L. Couch. Modeling next generation configuration management tools. In LISA, pages 131-147, 2006.
    • (2006) LISA , pp. 131-147
    • Burgess, M.1    Couch, A.L.2
  • 11
    • 84906772489 scopus 로고    scopus 로고
    • Introducing diversity and uncertainty to create moving attack surfaces for web services
    • Springer
    • Y. Huang and A. K. Ghosh. Introducing diversity and uncertainty to create moving attack surfaces for web services. In Moving Target Defense, pages 131-151. Springer, 2011.
    • (2011) Moving Target Defense , pp. 131-151
    • Huang, Y.1    Ghosh, A.K.2
  • 12
    • 84863914729 scopus 로고    scopus 로고
    • Configuration management security in data center environments
    • Springer
    • K. Kant. Configuration management security in data center environments. In Moving Target Defense, pages 161-181. Springer, 2011.
    • (2011) Moving Target Defense , pp. 161-181
    • Kant, K.1
  • 15
    • 39049113465 scopus 로고    scopus 로고
    • Address space layout permutation (aslp): Towards fine-grained randomization of commodity software
    • 22nd Annual, IEEE
    • C. Kil, J. Jun, C. Bookholt, J. Xu, and P. Ning. Address space layout permutation (aslp): Towards fine-grained randomization of commodity software. In Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, pages 339-348. IEEE, 2006.
    • (2006) Computer Security Applications Conference, 2006. ACSAC'06 , pp. 339-348
    • Kil, C.1    Jun, J.2    Bookholt, C.3    Xu, J.4    Ning, P.5
  • 16
    • 0036093229 scopus 로고    scopus 로고
    • Towards cost-sensitive modeling for intrusion detection and response
    • W. Lee, W. Fan, M. Miller, S. Stolfo, and E. Zadok. Towards cost-sensitive modeling for intrusion detection and response. Journal of Computer Security, 10(1-2):5-22, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.1-2 , pp. 5-22
    • Lee, W.1    Fan, W.2    Miller, M.3    Stolfo, S.4    Zadok, E.5
  • 17
    • 84906817346 scopus 로고    scopus 로고
    • Game theoretic approaches to attack surface shifting
    • Springer
    • P. K. Manadhata. Game theoretic approaches to attack surface shifting. In Moving Target Defense II, pages 1-13. Springer, 2013.
    • (2013) Moving Target Defense , vol.2 , pp. 1-13
    • Manadhata, P.K.1
  • 20
    • 84936741910 scopus 로고    scopus 로고
    • Global ISR: Toward a comprehensive defense against unauthorized code execution
    • Springer
    • G. Portokalidis and A. D. Keromytis. Global ISR: Toward a comprehensive defense against unauthorized code execution. In Moving Target Defense, pages 49-76. Springer, 2011.
    • (2011) Moving Target Defense , pp. 49-76
    • Portokalidis, G.1    Keromytis, A.D.2
  • 24
    • 84940644968 scopus 로고
    • A note on the concept of entropy
    • C. E. Shannon. A note on the concept of entropy. Bell System Tech. J, 27:379-423, 1948.
    • (1948) Bell System Tech. J , vol.27 , pp. 379-423
    • Shannon, C.E.1
  • 25
    • 84937702351 scopus 로고    scopus 로고
    • Online, accessed June 30
    • M. P. Singh. Towards a science of security. http://www.computer.org/portal/web/computingnow/archive/january2013, 2013. Online, accessed June 30, 2014.
    • (2014) Towards a Science of Security
    • Singh, M.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.