Moving Target Defense Moving Target Defense
Advances in Information Security

Moving Target Defense

Creating Asymmetric Uncertainty for Cyber Threats

Sushil Jajodia and Others
    • $109.99
    • $109.99

Publisher Description

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

GENRE
Computers & Internet
RELEASED
2011
August 26
LANGUAGE
EN
English
LENGTH
200
Pages
PUBLISHER
Springer New York
SELLER
Springer Nature B.V.
SIZE
1.5
MB
DYNAMICALLY ENABLED CYBER DEFENSE DYNAMICALLY ENABLED CYBER DEFENSE
2021
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2016
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2015
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2017
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2009
Building Secure Defenses Against Code-Reuse Attacks Building Secure Defenses Against Code-Reuse Attacks
2015
Adaptive Autonomous Secure Cyber Systems Adaptive Autonomous Secure Cyber Systems
2020
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Adversarial and Uncertain Reasoning for Adaptive Cyber Defense
2019
Network Security Metrics Network Security Metrics
2017
Theory and Models for Cyber Situation Awareness Theory and Models for Cyber Situation Awareness
2017
Cyber Deception Cyber Deception
2016
Graphical Models for Security Graphical Models for Security
2016
Differential Privacy and Applications Differential Privacy and Applications
2017
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
2025
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
2024
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024