DocumentCode :
106337
Title :
Finding Focus in the Blur of Moving-Target Techniques
Author :
Okhravi, Hamed ; Hobson, Thomas ; Bigelow, David ; Streilein, William
Volume :
12
Issue :
2
fYear :
2014
fDate :
Mar.-Apr. 2014
Firstpage :
16
Lastpage :
26
Abstract :
Protecting critical systems and assets against cyberattacks is an ever more difficult challenge that strongly favors attackers. Whereas defenders must protect a large, diverse set of cybersystems containing an unknown number of vulnerabilities of various types, attackers need only find one or a few exploitable vulnerabilities to mount a successful attack. One promising approach that can shift the balance in the defenders´ favor is to create uncertainty for attackers by dynamically changing system properties in what is called a cyber moving target (MT). MT techniques seek to randomize system components to reduce the likelihood of a successful attack, add dynamics to a system to reduce the lifetime of an attack, and diversify otherwise homogeneous collections of systems to limit the damage of a large-scale attack. In this article, the authors review the five dominant domains of MT techniques available today as research prototypes and commercial solutions. They present the techniques´ strengths and weaknesses and make recommendations for future research that will improve current capabilities.
Keywords :
security of data; critical system protection; cyber moving target; cyberattacks; large-scale attack; Computer crime; Computer security; Dynamic programming; IP networks; Network security; Ports (Computers); Runtime environment; Software engineering; Target tracking; ASLR; cyber moving target; dynamic data; dynamic network; dynamic platform; dynamic runtime environment; dynamic software; moving target; reconnaissance;
fLanguage :
English
Journal_Title :
Security & Privacy, IEEE
Publisher :
ieee
ISSN :
1540-7993
Type :
jour
DOI :
10.1109/MSP.2013.137
Filename :
6673500
Link To Document :
بازگشت