Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3052973.3055161acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
poster

Quantitative Security Assessment Method based on Entropy for Moving Target Defense

Published: 02 April 2017 Publication History

Abstract

Moving Target Defense(MTD) provides a promising solution to reduce the chance of weakness exposure by constantly changing the target's attack surface. Though lots of MTD technologies have been researched to defend network attacks, there is little systematic study on security assessment of MTD. This paper proposes a novel method to quantify the security of MTD system which based on three factors: Vulnerability Entropy, Attack Entropy and Attenuation Entropy. This assessment model provides a theoretical and practical guidance for building MTD system and improving MTD technology.

References

[1]
S. Jajodia et al., Moving-Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, Springer(2011)
[2]
Shacham, Hovav, et al. On the effectiveness of address-space randomization. the 11th ACM conference on Computer and communications security.(2004).
[3]
Gaurav S. Kc et al. Countering Code-Injection Attacks with Instruction-Set Randomization. In 10th ACM Conference on Computer and Communications Security (CCS)(2003)
[4]
A. Nguyen-Tuong et al., Security through Redundant Data Diversity. Proc. IEEE Int'l Conf. Dependable Systems and Networks with FTCS and DCC(2008).
[5]
Xu, Jun, et al. Comparing Different Moving Target Defense Techniques. Proceedings of the First ACM Workshop on Moving Target Defense. ACM(2014).
[6]
Manadhata P K, Wing J M. A formal model for a system's attack surface{M}. Springer New York(2011)

Cited By

View all
  • (2022)Game Theory Approaches for Evaluating the Deception-based Moving Target DefenseProceedings of the 9th ACM Workshop on Moving Target Defense10.1145/3560828.3563995(67-77)Online publication date: 11-Nov-2022
  • (2019)A Diversity Metric Based Study on the Correlation between Diversity and SecurityIEICE Transactions on Information and Systems10.1587/transinf.2018EDP7414E102.D:10(1993-2003)Online publication date: 1-Oct-2019
  • (2019)Enhancing the Reliability of NFV with Heterogeneous Backup2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)10.1109/ITNEC.2019.8729059(923-927)Online publication date: Mar-2019
  • Show More Cited By

Index Terms

  1. Quantitative Security Assessment Method based on Entropy for Moving Target Defense

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ASIA CCS '17: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security
    April 2017
    952 pages
    ISBN:9781450349444
    DOI:10.1145/3052973
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 April 2017

    Check for updates

    Author Tags

    1. entropy
    2. moving target defense
    3. network security
    4. quantitative assessment

    Qualifiers

    • Poster

    Funding Sources

    • the Strategic Priority Research Program of CAS
    • 863 Program of China
    • Zhengzhou Science and Technology Talents
    • 973 Program of China

    Conference

    ASIA CCS '17
    Sponsor:

    Acceptance Rates

    ASIA CCS '17 Paper Acceptance Rate 67 of 359 submissions, 19%;
    Overall Acceptance Rate 418 of 2,322 submissions, 18%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)10
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 27 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Game Theory Approaches for Evaluating the Deception-based Moving Target DefenseProceedings of the 9th ACM Workshop on Moving Target Defense10.1145/3560828.3563995(67-77)Online publication date: 11-Nov-2022
    • (2019)A Diversity Metric Based Study on the Correlation between Diversity and SecurityIEICE Transactions on Information and Systems10.1587/transinf.2018EDP7414E102.D:10(1993-2003)Online publication date: 1-Oct-2019
    • (2019)Enhancing the Reliability of NFV with Heterogeneous Backup2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC)10.1109/ITNEC.2019.8729059(923-927)Online publication date: Mar-2019
    • (2018)Democratic Supervision Makes Controls in Software-Defined Networks More Secure2018 IEEE 4th International Conference on Computer and Communications (ICCC)10.1109/CompComm.2018.8781034(1175-1179)Online publication date: Dec-2018

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media