Home > Research > Publications & Outputs > Poster: Effectiveness of Moving Target Defense ...

Electronic data

  • ACM_CCS__MTD_Poster_ (1)

    Rights statement: © ACM, 2022. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security http://doi.acm.org/10.1145/3548606.3563514

    Accepted author manuscript, 521 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

Poster: Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Publication date7/11/2022
Host publicationCCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
EditorsHeng Yin, Angelos Stavrou
Place of PublicationNew York
PublisherACM
Pages3415-3417
Number of pages3
ISBN (electronic)9781450394505
<mark>Original language</mark>English
EventACM Conference on Computer and Communications Security - Los Angeles, United States
Duration: 7/11/202211/11/2022
https://www.sigsac.org/ccs/CCS2022/

Conference

ConferenceACM Conference on Computer and Communications Security
Abbreviated titleCCS
Country/TerritoryUnited States
CityLos Angeles
Period7/11/2211/11/22
Internet address

Publication series

NameProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
PublisherACM

Conference

ConferenceACM Conference on Computer and Communications Security
Abbreviated titleCCS
Country/TerritoryUnited States
CityLos Angeles
Period7/11/2211/11/22
Internet address

Abstract

Moving Target Defense (MTD) can eliminate the asymmetric advantage that attackers have in terms of time to explore a static system by changing a system's configuration dynamically to reduce the efficacy of reconnaissance and increase uncertainty and complexity for attackers. To this extent, a variety of MTDs have been proposed for specific aspects of a system. However, deploying MTDs at different layers/components of the Cloud and assessing their effects on the overall security gains for the entire system is still challenging since the Cloud is a complex system entailing physical and virtual resources, and there exists a multitude of attack surfaces that an attacker can target. Thus, we explore the combination of MTDs, and their deployment at different components (belonging to various operational layers) to maximize the security gains offered by the MTDs.We also propose a quantification mechanism to evaluate the effectiveness of the MTDs against the attacks in the Cloud.

Bibliographic note

© ACM, 2022. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security http://doi.acm.org/10.1145/3548606.3563514