Moving Target Defense Moving Target Defense
Advances in Information Security

Moving Target Defense

Creating Asymmetric Uncertainty for Cyber Threats

Sushil Jajodia and Others
    • $109.99
    • $109.99

Publisher Description

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

GENRE
Computers & Internet
RELEASED
2011
August 26
LANGUAGE
EN
English
LENGTH
200
Pages
PUBLISHER
Springer New York
SELLER
Springer Nature B.V.
SIZE
1.5
MB
DYNAMICALLY ENABLED CYBER DEFENSE DYNAMICALLY ENABLED CYBER DEFENSE
2021
Building Secure Defenses Against Code-Reuse Attacks Building Secure Defenses Against Code-Reuse Attacks
2015
Intelligent Security Systems Intelligent Security Systems
2021
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers
2014
Malware Intrusion Detection Malware Intrusion Detection
2011
Automatic Malware Analysis Automatic Malware Analysis
2012
Theory and Models for Cyber Situation Awareness Theory and Models for Cyber Situation Awareness
2017
Cyber Deception Cyber Deception
2016
Adaptive Autonomous Secure Cyber Systems Adaptive Autonomous Secure Cyber Systems
2020
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Adversarial and Uncertain Reasoning for Adaptive Cyber Defense
2019
Network Security Metrics Network Security Metrics
2017
Graphical Models for Security Graphical Models for Security
2016
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016
Security for Telecommunications Networks Security for Telecommunications Networks
2008
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015
Network Security Policies and Procedures Network Security Policies and Procedures
2007