Moving Target Defense Moving Target Defense
Advances in Information Security

Moving Target Defense

Creating Asymmetric Uncertainty for Cyber Threats

Sushil Jajodia and Others
    • €89.99
    • €89.99

Publisher Description

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

GENRE
Computing & Internet
RELEASED
2011
26 August
LANGUAGE
EN
English
LENGTH
200
Pages
PUBLISHER
Springer New York
SIZE
1.5
MB

More Books Like This

DYNAMICALLY ENABLED CYBER DEFENSE DYNAMICALLY ENABLED CYBER DEFENSE
2021
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2016
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2015
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2017
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2009
Building Secure Defenses Against Code-Reuse Attacks Building Secure Defenses Against Code-Reuse Attacks
2015

More Books by Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang & X. Sean Wang

Adaptive Autonomous Secure Cyber Systems Adaptive Autonomous Secure Cyber Systems
2020
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Adversarial and Uncertain Reasoning for Adaptive Cyber Defense
2019
Network Security Metrics Network Security Metrics
2017
Theory and Models for Cyber Situation Awareness Theory and Models for Cyber Situation Awareness
2017
Cyber Deception Cyber Deception
2016
Graphical Models for Security Graphical Models for Security
2016

Other Books in This Series

Adversarial Multimedia Forensics Adversarial Multimedia Forensics
2024
Blockchains Blockchains
2024
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
2024
Security and Risk Analysis for Intelligent Edge Computing Security and Risk Analysis for Intelligent Edge Computing
2023
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
2023
Blockchain for Cybersecurity in Cyber-Physical Systems Blockchain for Cybersecurity in Cyber-Physical Systems
2023