Evaluating Moving Target Defenses against Realistic Attack Scenarios

Alex Brown, Tze Wen Lee, Jin B. Hong

Research output: Chapter in Book/Conference paperConference paperpeer-review

2 Citations (Scopus)

Abstract

Defenders are continuously seeking new tools for better security, including proactive defenses like Moving Target Defense (MTD). MTD continuously changes the attack surface, but there's little research on combining different MTD techniques, and often attack scenarios considered are simple and unrealistic. This paper proposes to evaluate the combined effects of MTD techniques against practical and realistic attack scenarios through a simulation framework. Our results indicate that adopting MTD techniques in general improves the security of systems, but combinations can have varying levels of defense depending on the attack scenarios. Hence, our proposed approach provides a more realistic evaluation of MTD techniques and their combinations taking into account practical attack scenarios, which can aid decision-makers to make better-informed decisions.

Original languageEnglish
Title of host publicationProceedings - 2023 IEEE/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2023
Place of PublicationUSA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1-8
Number of pages8
ISBN (Electronic)9798350338140
DOIs
Publication statusPublished - 2023
Event4th IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2023 - Melbourne, Australia
Duration: 15 May 2023 → …

Publication series

NameProceedings - 2023 IEEE/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2023

Conference

Conference4th IEEE/ACM International Workshop on Engineering and Cybersecurity of Critical Systems, EnCyCriS 2023
Country/TerritoryAustralia
CityMelbourne
Period15/05/23 → …

Fingerprint

Dive into the research topics of 'Evaluating Moving Target Defenses against Realistic Attack Scenarios'. Together they form a unique fingerprint.

Cite this