Apress

Moving Target Defense

Creating Asymmetric Uncertainty for Cyber Threats

By Sushil Jajodia , Anup K. Ghosh , Vipin Swarup , Cliff Wang , X. Sean Wang

Moving Target Defense Cover Image

  • ISBN13: 978-1-4614-0976-2
  • 198 Pages
  • User Level: Professionals
  • Publication Date: August 26, 2011
  • Available eBook Formats: PDF
  • eBook Price: $129.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.
Table of Contents

Table of Contents

  1. A Formal Model for a System’s Attack Surface.
  2. Effectiveness of Moving Target Defenses.
  3. Global ISR: Toward a Comprehensive Defense Against.
  4. Compiler
  5. Generated Software Diversity.
  6. Symbiotes and defensive Mutualism: Moving Target Defense.
  7. Manipulating Program Functionality to Eliminate Security.
  8. End
  9. to
  10. End Software Diversification of Internet Services.
  11. Introducing Diversity and Uncertainty to Create Moving Attack.
  12. Toward Network Configuration Randomization for Moving Target Defense.
  13. Configuration Management Security in Data Center Environments.
Errata

If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.

* Required Fields

No errata are currently published