Proactive defense mechanism (2024)

research-article

Free Access

  • Authors:
  • Zubaida Rehman RMIT University, Australia

    RMIT University, Australia

    Search about this author

    ,
  • Iqbal Gondal RMIT University, Australia

    RMIT University, Australia

    Search about this author

    ,
  • Mengmeng Ge University of Canterbury, New Zealand

    University of Canterbury, New Zealand

    Search about this author

    ,
  • Hai Dong RMIT University, Australia

    RMIT University, Australia

    Search about this author

    ,
  • Mark Gregory RMIT University, Australia

    RMIT University, Australia

    Search about this author

    ,
  • Zahir Tari RMIT University, Australia

    RMIT University, Australia

    Search about this author

Computers and SecurityVolume 139Issue CApr 2024https://doi.org/10.1016/j.cose.2023.103685

Published:16 May 2024Publication History

  • 0citation
  • 0
  • Downloads

Metrics

Total Citations0Total Downloads0

Last 12 Months0

Last 6 weeks0

Computers and Security

Volume 139, Issue C

PreviousArticleNextArticle

Proactive defense mechanism (1)

Skip Abstract Section

Abstract

Abstract

The Internet of Things (IoT) has become increasingly prevalent in various aspects of our lives, enabling billions of devices to connect and communicate seamlessly. However, the intricate nature of IoT connections and device vulnerabilities exposes the devices to security threats. To address the security challenges, we propose a proactive defense framework that leverages a model-based approach for security analysis and facilitates the defense strategies. Our proposed approach incorporates proactive defense mechanisms that combine Moving Target Defense techniques with cyber deception. The proposed approach involves the use of a decoy nodes as a deception technique and operating system based diversity as a moving target defense strategy to change the attack surface area of IoT networks. Additionally, we introduce a technique known as Important Measure-based Operating System Diversity to reduce defense cost. The effectiveness of the defense mechanisms was evaluated by using a graphical security model in a Software Defined Networking-based IoT network. Simulation results demonstrate the effectiveness of our approach in mitigating the impact of attacks while maintaining high performance levels in IoT networks.

References

  1. Ajmal et al., 2021 Ajmal A.B., Alam M., Khaliq A.A., Khan S., Qadir Z., Mahmud M.P., Last line of defense: reliability through inducing cyber threat hunting with deception in scada networks, IEEE Access 9 (2021) 126789126800.Google ScholarProactive defense mechanism (2)
  2. Al-Shaer, 2011 Al-Shaer E., Toward network configuration randomization for moving target defense, in: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Springer, 2011, pp. 153159.Google ScholarProactive defense mechanism (3)
  3. Alavizadeh et al., 2018 Alavizadeh H., Jang-Jaccard J., Kim D.S., Evaluation for combination of shuffle and diversity on moving target defense strategy for cloud computing, in: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), IEEE, 2018, pp. 573578.Google ScholarProactive defense mechanism (4)
  4. Alavizadeh et al., 2017 Alavizadeh H., Kim D.S., Hong J.B., Jang-Jaccard J., Effective security analysis for combinations of mtd techniques on cloud computing (short paper), in: International Conference on Information Security Practice and Experience, Springer, 2017, pp. 539548.Google ScholarProactive defense mechanism (5)
  5. Alavizadeh et al., 2020 Alavizadeh H., Kim D.S., Jang-Jaccard J., Model-based evaluation of combinations of shuffle and diversity mtd techniques on the cloud, Future Gener. Comput. Syst. 111 (2020) 507522.Google ScholarProactive defense mechanism (6)
  6. Almohaimeed et al., 2019 Almohaimeed A., Gampa S., Singh G., Privacy-preserving iot devices, in: 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT), IEEE, 2019, pp. 15.Google ScholarProactive defense mechanism (7)
  7. Anirudh et al., 2017 Anirudh M., Thileeban S.A., Nallathambi D.J., Use of honeypots for mitigating dos attacks targeted on iot networks, in: 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), IEEE, 2017, pp. 14.Google ScholarProactive defense mechanism (8)
  8. Antonatos et al., 2005 Antonatos S., Akritidis P., Markatos E.P., Anagnostakis K.G., Defending against hitlist worms using network address space randomization, in: Proceedings of the 2005 ACM Workshop on Rapid Malcode, 2005, pp. 3040.Google ScholarProactive defense mechanism (9)
  9. Anwar et al., 2020 Anwar A.H., Kamhoua C., Leslie N., Honeypot allocation over attack graphs in cyber deception games, in: 2020 International Conference on Computing, Networking and Communications (ICNC), IEEE, 2020, pp. 502506.Google ScholarProactive defense mechanism (10)
  10. Anwar and Kamhoua, 2022 Anwar A.H., Kamhoua C.A., Cyber deception using honeypot allocation and diversity: a game theoretic approach, in: 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC), IEEE, 2022, pp. 543549.Google ScholarProactive defense mechanism (11)
  11. Azab et al., 2011 Azab M., Hassan R., Eltoweissy M., Chameleonsoft: a moving target defense system, in: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), IEEE, 2011, pp. 241250.Google ScholarProactive defense mechanism (12)
  12. Bawany et al., 2017 Bawany N.Z., Shamsi J.A., Salah K., Ddos attack detection and mitigation using sdn: methods, practices, and solutions, Arab. J. Sci. Eng. 42 (2017) 425441.Google ScholarProactive defense mechanism (13)
  13. Bernardos et al., 2014 Bernardos C.J., De La Oliva A., Serrano P., Banchs A., Contreras L.M., Jin H., Zúñiga J.C., An architecture for software defined wireless networking, IEEE Wirel. Commun. 21 (3) (2014) 5261.Google ScholarProactive defense mechanism (14)
  14. Bhunia and Gurusamy, 2017 Bhunia S.S., Gurusamy M., Dynamic attack detection and mitigation in iot using sdn, in: 2017 27th International Telecommunication Networks and Applications Conference (ITNAC), IEEE, 2017, pp. 16.Google ScholarProactive defense mechanism (15)
  15. Borbor et al., 2019 Borbor D., Wang L., Jajodia S., Singhal A., Optimizing the network diversity to improve the resilience of networks against unknown attacks, Comput. Commun. 145 (2019) 96112.Google ScholarProactive defense mechanism (16)Digital Library
  16. Bulle et al., 2020 Bulle B.B., Santin A.O., Viegas E.K., dos Santos R.R., A host-based intrusion detection model based on os diversity for scada, in: IECON 2020 the 46th Annual Conference of the IEEE Industrial Electronics Society, IEEE, 2020, pp. 691696.Google ScholarProactive defense mechanism (18)
  17. Butun et al., 2019 Butun I., Österberg P., Song H., Security of the Internet of things: vulnerabilities, attacks, and countermeasures, IEEE Commun. Surv. Tutor. 22 (1) (2019) 616644.Google ScholarProactive defense mechanism (19)Digital Library
  18. Cai et al., 2016 Cai G.-l., Wang B.-s., Hu W., Wang T.-z., Moving target defense: state of the art and characteristics, Front. Inf. Technol. Electron. Eng. 17 (11) (2016) 11221153.Google ScholarProactive defense mechanism (21)
  19. Chaabouni et al., 2019 Chaabouni N., Mosbah M., Zemmari A., Sauvignac C., Faruki P., Network intrusion detection for iot security based on learning techniques, IEEE Commun. Surv. Tutor. 21 (3) (2019) 26712701.Google ScholarProactive defense mechanism (22)
  20. Chen et al., 2021 Chen H., Cam H., Xu S., Quantifying cybersecurity effectiveness of dynamic network diversity, IEEE Trans. Dependable Secure Comput. 19 (6) (2021) 38043821.Google ScholarProactive defense mechanism (23)
  21. Cho et al., 2020 Cho J.-H., Sharma D.P., Alavizadeh H., Yoon S., Ben-Asher N., Moore T.J., Kim D.S., Lim H., Nelson F.F., Toward proactive, adaptive defense: a survey on moving target defense, IEEE Commun. Surv. Tutor. 22 (1) (2020) 709745.Google ScholarProactive defense mechanism (24)Digital Library
  22. De Oliveira et al., 2015 De Oliveira B.T., Gabriel L.B., Margi C.B., Tinysdn: enabling multiple controllers for software-defined wireless sensor networks, IEEE Lat. Am. Trans. 13 (11) (2015) 36903696.Google ScholarProactive defense mechanism (26)
  23. Dowling et al., 2017 Dowling S., Schukat M., Melvin H., A zigbee honeypot to assess iot cyberattack behaviour, in: 2017 28th Irish Signals and Systems Conference (ISSC), IEEE, 2017, pp. 16.Google ScholarProactive defense mechanism (27)
  24. Du and Wang, 2019 Du M., Wang K., An sdn-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial internet of things, IEEE Trans. Ind. Inform. 16 (1) (2019) 648657.Google ScholarProactive defense mechanism (28)
  25. Duman et al., 2017 Duman O., Zhang M., Wang L., Debbabi M., Measuring the security posture of iec 61850 substations with redundancy against zero day attacks, in: 2017 IEEE International Conference on Smart Grid Communications (SmartGridComm), IEEE, 2017, pp. 108114.Google ScholarProactive defense mechanism (29)
  26. Fda, 2017 Fda F.D.A., US Food and Drug Administration, 2017.Google ScholarProactive defense mechanism (30)
  27. Galluccio et al., 2015 Galluccio L., Milardo S., Morabito G., Palazzo S., Sdn-wise: design, prototyping and experimentation of a stateful sdn solution for wireless sensor networks, in: 2015 IEEE Conference on Computer Communications (INFOCOM), IEEE, 2015, pp. 513521.Google ScholarProactive defense mechanism (31)
  28. Garcia et al., 2011 Garcia M., Bessani A., Gashi I., Neves N., Obelheiro R., Os diversity for intrusion tolerance: myth or reality?, in: 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), IEEE, 2011, pp. 383394.Google ScholarProactive defense mechanism (32)
  29. Gärtner, 2003 Gärtner F.C., Byzantine failures and security: arbitrary is not (always) random, in: INFORMATIK 2003-Mit Sicherheit Informatik, Schwerpunkt “Sicherheit-Schutz und Zuverlässigkeit”, 2003.Google ScholarProactive defense mechanism (33)
  30. Ge et al., 2021 Ge M., Cho J.-H., Kim D., Dixit G., Chen I.-R., Proactive defense for internet-of-things: moving target defense with cyberdeception, ACM Trans. Internet Technol. 22 (1) (2021) 131.Google ScholarProactive defense mechanism (34)
  31. Ge et al., 2017 Ge M., Hong J.B., Guttmann W., Kim D.S., A framework for automating security analysis of the internet of things, J. Netw. Comput. Appl. 83 (2017) 1227.Google ScholarProactive defense mechanism (35)
  32. Gorbenko et al., 2019 Gorbenko A., Romanovsky A., Tarasyuk O., Biloborodov O., From analyzing operating system vulnerabilities to designing multiversion intrusion-tolerant architectures, IEEE Trans. Reliab. 69 (1) (2019) 2239.Google ScholarProactive defense mechanism (36)
  33. Guo et al., 2019 Guo X., Lin H., Li Z., Peng M., Deep-reinforcement-learning-based qos-aware secure routing for sdn-iot, IEEE Int. Things J. 7 (7) (2019) 62426251.Google ScholarProactive defense mechanism (37)
  34. Hamada et al., 2018 Hamada A.O., Azab M., Mokhtar A., Honeypot-like moving-target defense for secure iot operation, in: 2018 IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), IEEE, 2018, pp. 971977.Google ScholarProactive defense mechanism (38)
  35. Hassija et al., 2019 Hassija V., Chamola V., Saxena V., Jain D., Goyal P., Sikdar B., A survey on iot security: application areas, security threats, and solution architectures, IEEE Access 7 (2019) 8272182743.Google ScholarProactive defense mechanism (39)
  36. Hong and Kim, 2013 Hong J.B., Kim D.S., Scalable security model generation and analysis using k-importance measures, in: Security and Privacy in Communication Networks: 9th International ICST Conference, in: Revised Selected Papers, vol. 9, SecureComm 2013, Sydney, NSW, Australia, September 25–28, 2013, Springer, 2013, pp. 270287.Google ScholarProactive defense mechanism (40)
  37. Hong and Kim, 2015 Hong J.B., Kim D.S., Assessing the effectiveness of moving target defenses using security models, IEEE Trans. Dependable Secure Comput. 13 (2) (2015) 163177.Google ScholarProactive defense mechanism (41)Digital Library
  38. Hong et al., 2017 Hong J.B., Kim D.S., Chung C.-J., Huang D., A survey on the usability and practical applications of graphical security models, Comput. Sci. Rev. 26 (2017) 116.Google ScholarProactive defense mechanism (43)Digital Library
  39. Huang and Ghosh, 2011 Huang Y., Ghosh A.K., Introducing diversity and uncertainty to create moving attack surfaces for web services, in: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Springer, 2011, pp. 131151.Google ScholarProactive defense mechanism (45)
  40. Islam and Al-Shaer, 2020 Islam M.M., Al-Shaer E., Active deception framework: an extensible development environment for adaptive cyber deception, in: 2020 IEEE Secure Development (SecDev), IEEE, 2020, pp. 4148.Google ScholarProactive defense mechanism (46)
  41. Jafarian et al., 2012 Jafarian J.H., Al-Shaer E., Duan Q., Openflow random host mutation: transparent moving target defense using software defined networking, in: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, 2012, pp. 127132.Google ScholarProactive defense mechanism (47)
  42. Kanellopoulos and Vamvoudakis, 2019 Kanellopoulos A., Vamvoudakis K.G., A moving target defense control framework for cyber-physical systems, IEEE Trans. Autom. Control 65 (3) (2019) 10291043.Google ScholarProactive defense mechanism (48)
  43. Khosravi-Farmad et al., 2018 Khosravi-Farmad M., Ramaki A.A., Bafghi A.G., Moving target defense against advanced persistent threats for cybersecurity enhancement, in: 2018 8th International Conference on Computer and Knowledge Engineering (ICCKE), IEEE, 2018, pp. 280285.Google ScholarProactive defense mechanism (49)
  44. Koo et al., 2018 Koo H., Chen Y., Lu L., Kemerlis V.P., Polychronakis M., Compiler-assisted code randomization, in: 2018 IEEE Symposium on Security and Privacy (SP), IEEE, 2018, pp. 461477.Google ScholarProactive defense mechanism (50)
  45. Kotronis et al., 2012 Kotronis V., Dimitropoulos X., Ager B., Outsourcing the routing control logic: better internet routing based on sdn principles, in: Proceedings of the 11th ACM Workshop on Hot Topics in Networks, 2012, pp. 5560.Google ScholarProactive defense mechanism (51)
  46. Kouachi et al., 2018 Kouachi A.I., Sahraoui S., Bachir A., Per packet flow anonymization in 6lowpan iot networks, in: 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), IEEE, 2018, pp. 17.Google ScholarProactive defense mechanism (52)
  47. Li et al., 2017 Li C., Qin Z., Novak E., Li Q., Securing sdn infrastructure of iot–fog networks from mitm attacks, IEEE Int. Things J. 4 (5) (2017) 11561164.Google ScholarProactive defense mechanism (53)
  48. Liu et al., 2020a Liu W., Ge M., Kim D.S., Integrated proactive defense for software defined internet of things under multi-target attacks, in: 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing (CCGRID), IEEE, 2020, pp. 767774.Google ScholarProactive defense mechanism (54)
  49. Liu et al., 2020b Liu Y., Grigoryan G., Kamhoua C.A., Njilla L.L., Leverage sdn for cyber-security deception in internet of things, in: Modeling and Design of Secure Internet of Things, 2020, pp. 479503.Google ScholarProactive defense mechanism (55)
  50. Mahmood and Shila, 2016 Mahmood K., Shila D.M., Moving target defense for internet of things using context aware code partitioning and code diversification, in: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), IEEE, 2016, pp. 329330.Google ScholarProactive defense mechanism (56)
  51. Mudaliar and Sivakumar, 2020 Mudaliar M.D., Sivakumar N., Iot based real time energy monitoring system using raspberry pi, Int. Things 12 (2020).Google ScholarProactive defense mechanism (57)
  52. Navas et al., 2020 Navas R.E., Cuppens F., Cuppens N.B., Toutain L., Papadopoulos G.Z., Mtd, where art thou? A systematic review of moving target defense techniques for iot, IEEE Int. Things J. 8 (10) (2020) 78187832.Google ScholarProactive defense mechanism (58)
  53. NIST, 2023 NIST , National Vulnerability Database. National Institute of Standards and Technology, U.S. Government, 2023.Google ScholarProactive defense mechanism (59)
  54. Nizzi et al., 2019 Nizzi F., Pecorella T., Esposito F., Pierucci L., Fantacci R., Iot security via address shuffling: the easy way, IEEE Int. Things J. 6 (2) (2019) 37643774.Google ScholarProactive defense mechanism (60)
  55. Oo and Koide, 2019 Oo W.K.K., Koide H., A framework of moving target defenses for the Internet of things, Bull. Netw. Comput. Syst. Softw. 8 (2) (2019) 104107.Google ScholarProactive defense mechanism (61)
  56. Qin et al., 2014 Qin Z., Denker G., Giannelli C., Bellavista P., Venkatasubramanian N., A software defined networking architecture for the internet-of-things, in: 2014 IEEE Network Operations and Management Symposium (NOMS), IEEE, 2014, pp. 19.Google ScholarProactive defense mechanism (62)
  57. Ravi and Shalinie, 2020 Ravi N., Shalinie S.M., Learning-driven detection and mitigation of ddos attack in iot via sdn-cloud architecture, IEEE Int. Things J. 7 (4) (2020) 35593570.Google ScholarProactive defense mechanism (63)
  58. Salman et al., 2018 Salman O., Elhajj I., Chehab A., Kayssi A., Iot survey: an sdn and fog computing perspective, Comput. Netw. 143 (2018) 221246.Google ScholarProactive defense mechanism (64)Digital Library
  59. Savola et al., 2012 Savola R.M., Abie H., Sihvonen M., Towards metrics-driven adaptive security management in e-health iot applications, in: BODYNETS, 2012, pp. 276281.Google ScholarProactive defense mechanism (66)
  60. Sengupta et al., 2020 Sengupta S., Chowdhary A., Sabur A., Alshamrani A., Huang D., Kambhampati S., A survey of moving target defenses for network security, IEEE Commun. Surv. Tutor. 22 (3) (2020) 19091941.Google ScholarProactive defense mechanism (67)
  61. Smith et al., 2020 Smith J., Johnson A., Davis M., A comparative analysis of intrusion detection techniques for iot networks, in: IEEE International Conference on Internet of Things (iThings), IEEE, 2020.Google ScholarProactive defense mechanism (68)
  62. Tambe et al., 2019 Tambe A., Aung Y.L., Sridharan R., Ochoa M., Tippenhauer N.O., Shabtai A., Elovici Y., Detection of threats to iot devices using scalable vpn-forwarded honeypots, in: Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019, pp. 8596.Google ScholarProactive defense mechanism (69)
  63. Team, 2003 Team P. (2003): Pax address space layout randomization. http://pax.grsecurity.net/docs/aslr.txt.Google ScholarProactive defense mechanism (70)
  64. Torquato et al., 2020 Torquato M., Maciel P., Vieira M., Security and availability modeling of vm migration as moving target defense, in: 2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC), IEEE, 2020, pp. 5059.Google ScholarProactive defense mechanism (71)
  65. Wang and Lu, 2018 Wang C., Lu Z., Cyber deception: overview and the road ahead, IEEE Secur. Priv. 16 (2) (2018) 8085.Google ScholarProactive defense mechanism (72)
  66. Wang et al., 2017 Wang J., Miao Y., Zhou P., Hossain M.S., Rahman S.M.M., A software defined network routing in wireless multihop network, J. Netw. Comput. Appl. 85 (2017) 7683.Google ScholarProactive defense mechanism (73)Digital Library
  67. Wang et al., 2019 Wang S., Shi H., Hu Q., Lin B., Cheng X., Moving target defense for internet of things based on the zero-determinant theory, IEEE Int. Things J. 7 (1) (2019) 661668.Google ScholarProactive defense mechanism (75)
  68. Winn et al., 2015 Winn M., Rice M., Dunlap S., Lopez J., Mullins B., Constructing cost-effective and targetable industrial control system honeypots for production networks, Int. J. Crit. Infrastruct. Prot. 10 (2015) 4758.Google ScholarProactive defense mechanism (76)Digital Library
  69. Yao et al., 2019 Yao S., Li Z., Guan J., Liu Y., Stochastic cost minimization mechanism based on identifier network for iot security, IEEE Int. Things J. 7 (5) (2019) 39233934.Google ScholarProactive defense mechanism (78)
  70. Zeng et al., 2015 Zeng D., Li P., Guo S., Miyazaki T., Hu J., Xiang Y., Energy minimization in multi-task software-defined sensor networks, IEEE Trans. Comput. 64 (11) (2015) 31283139.Google ScholarProactive defense mechanism (79)
  71. Zhang et al., 2014 Zhang L., Shetty S., Liu P., Jing J., Rootkitdet: practical end-to-end defense against kernel rootkits in a cloud environment, in: Computer Security-ESORICS 2014: 19th European Symposium on Research in Computer Security, Proceedings, Part II 19, Wroclaw, Poland, September 7–11, 2014, Springer, 2014, pp. 475493.Google ScholarProactive defense mechanism (80)
  72. Zhang et al., 2016 Zhang M., Wang L., Jajodia S., Singhal A., Albanese M., Network diversity: a security metric for evaluating the resilience of networks against zero-day attacks, IEEE Trans. Inf. Forensics Secur. 11 (5) (2016) 10711086.Google ScholarProactive defense mechanism (81)Digital Library
  73. Zhang et al., 2012 Zhang Y., Li M., Bai K., Yu M., Zang W., Incentive compatible moving target defense against vm-colocation attacks in clouds, in: Information Security and Privacy Research: 27th IFIP TC 11 Information Security and Privacy Conference, Proceedings 27, SEC 2012, Heraklion, Crete, Greece, June 4–6, 2012, Springer, 2012, pp. 388399.Google ScholarProactive defense mechanism (83)
  74. Zhang et al., 2018 Zhang Z., Njilla L., Kamhoua C.A., Yu Q., Thwarting security threats from malicious fpga tools with novel fpga-oriented moving target defense, IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 27 (3) (2018) 665678.Google ScholarProactive defense mechanism (84)
  75. Zheng and Namin, 2019 Zheng J., Namin A.S., A survey on the moving target defense strategies: an architectural perspective, J. Comput. Sci. Technol. 34 (2019) 207233.Google ScholarProactive defense mechanism (85)
  76. Zhou et al., 2021 Zhou Y., Cheng G., Yu S., An sdn-enabled proactive defense framework for ddos mitigation in iot networks, IEEE Trans. Inf. Forensics Secur. 16 (2021) 53665380.Google ScholarProactive defense mechanism (86)Digital Library
  77. Zscaler, 2023 Zscaler , Zscaler Deploying Services, 2023.Google ScholarProactive defense mechanism (88)

Cited By

View all

Proactive defense mechanism (89)

    Recommendations

    • Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception

      Resource constrained Internet-of-Things (IoT) devices are highly likely to be compromised by attackers, because strong security protections may not be suitable to be deployed. This requires an alternative approach to protect vulnerable components in IoT ...

      Read More

    • Moving Target Defense Against Injection Attacks

      Algorithms and Architectures for Parallel Processing

      Abstract

      With the development of network technology, web services become more convenient and popular. However, web services are also facing serious security threats, especially SQL injection attack(SQLIA). Due to the diversity of attack techniques and the ...

      Read More

    • Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud

      Abstract

      Moving Target Defense (MTD) is a defensive strategy to thwart adversaries by continuously shifting the attack surface. The MTD techniques can be applied to the cloud computing to make the cloud more unpredictable, hence more difficult ...

      Read More

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    Get this Article

    • Information
    • Contributors
    • Published in

      Proactive defense mechanism (90)

      Computers and Security Volume 139, Issue C

      Apr 2024

      874 pages

      ISSN:0167-4048

      Issue’s Table of Contents

      The Author(s)

      Sponsors

        In-Cooperation

          Publisher

          Elsevier Advanced Technology Publications

          United Kingdom

          Publication History

          • Published: 16 May 2024

          Author Tags

          • Internet of things
          • Moving target defense
          • Graphical security models
          • Diversity

          Qualifiers

          • research-article

          Conference

          Funding Sources

          • Proactive defense mechanism (91)

            Other Metrics

            View Article Metrics

          • Bibliometrics
          • Citations0
          • Article Metrics

            • Total Citations

              View Citations
            • Total Downloads

            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0

            Other Metrics

            View Author Metrics

          • Cited By

            This publication has not been cited yet

          Digital Edition

          View this article in digital edition.

          View Digital Edition

          • Figures
          • Other

            Close Figure Viewer

            Browse AllReturn

            Caption

            View Issue’s Table of Contents

            Export Citations

              Proactive defense mechanism (2024)
              Top Articles
              Latest Posts
              Article information

              Author: Nicola Considine CPA

              Last Updated:

              Views: 5843

              Rating: 4.9 / 5 (69 voted)

              Reviews: 84% of readers found this page helpful

              Author information

              Name: Nicola Considine CPA

              Birthday: 1993-02-26

              Address: 3809 Clinton Inlet, East Aleisha, UT 46318-2392

              Phone: +2681424145499

              Job: Government Technician

              Hobby: Calligraphy, Lego building, Worldbuilding, Shooting, Bird watching, Shopping, Cooking

              Introduction: My name is Nicola Considine CPA, I am a determined, witty, powerful, brainy, open, smiling, proud person who loves writing and wants to share my knowledge and understanding with you.