Moving Target Defense Moving Target Defense
Advances in Information Security

Moving Target Defense

Creating Asymmetric Uncertainty for Cyber Threats

Sushil Jajodia 및 다른 저자
    • US$109.99
    • US$109.99

출판사 설명

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

장르
컴퓨터 및 인터넷
출시일
2011년
8월 26일
언어
EN
영어
길이
200
페이지
출판사
Springer New York
판매자
Springer Nature B.V.
크기
1.5
MB
DYNAMICALLY ENABLED CYBER DEFENSE DYNAMICALLY ENABLED CYBER DEFENSE
2021년
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2016년
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2015년
Research in Attacks, Intrusions, and Defenses Research in Attacks, Intrusions, and Defenses
2017년
Detection of Intrusions and Malware, and Vulnerability Assessment Detection of Intrusions and Malware, and Vulnerability Assessment
2009년
Building Secure Defenses Against Code-Reuse Attacks Building Secure Defenses Against Code-Reuse Attacks
2015년
Theory and Models for Cyber Situation Awareness Theory and Models for Cyber Situation Awareness
2017년
Cyber Deception Cyber Deception
2016년
Adaptive Autonomous Secure Cyber Systems Adaptive Autonomous Secure Cyber Systems
2020년
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Adversarial and Uncertain Reasoning for Adaptive Cyber Defense
2019년
Network Security Metrics Network Security Metrics
2017년
Graphical Models for Security Graphical Models for Security
2016년
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
2009년
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
2016년
Security for Telecommunications Networks Security for Telecommunications Networks
2008년
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
2007년
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
2015년
Network Security Policies and Procedures Network Security Policies and Procedures
2007년