Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2995272acmconferencesBook PagePublication PagesicseConference Proceedingsconference-collections
MTD '16: Proceedings of the 2016 ACM Workshop on Moving Target Defense
ACM2016 Proceeding
  • Program Chairs:
  • Peng Liu,
  • Cliff Wang
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS'16: 2016 ACM SIGSAC Conference on Computer and Communications Security Vienna Austria 24 October 2016
ISBN:
978-1-4503-4570-5
Published:
24 October 2016
Sponsors:
Next Conference
Reflects downloads up to 21 Nov 2024Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 2016 MTD (Moving Target Defense) Workshop. This workshop seeks to bring together researchers from academia, government, and industry to report on the latest results on moving-target defense research, and to have productive discussion and constructive debate on this topic. The workshop is a single day event co-located with the 2016 ACM Conference on Computer and Communications Security (ACM CCS). Out of a total of 26 submissions from Asia, Europe, and North America, we accepted 9 regular papers and 2 short papers. In addition, we have accepted one system demo.

We also encourage attendees to attend the keynote and invited talk presentations. These valuable and insightful talks will give us a better understanding of the future:

  • A Cyber Mutation: Metrics, Techniques and Future Directions, Ehab Al-Shaer (who is currently at UNC Charlotte)

  • Moving Target Defense - A Journey from Idea to Product, Jason Li (who is currently at Intelligent Automation, Inc.)

Skip Table Of Content Section
SESSION: Keynote Talk
invited-talk
A Cyber Mutation: Metrics, Techniques and Future Directions

After decades of cyber warfare, it is well-known that the static and predictable behavior of cyber configuration provides a great advantage to adversaries to plan and launch their attack successfully. At the same time, as cyber attacks are getting ...

SESSION: Paper Session: New Moving Target Defenses (I)
research-article
Public Access
Have No PHEAR: Networks Without Identifiers

Network protocols such as Ethernet and TCP/IP were not designed to ensure the security and privacy of users. To protect users' privacy, anonymity networks such as Tor have been proposed to hide both identities and communication contents for Internet ...

research-article
Public Access
Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks

Traditionally, network and system configurations are static. Attackers have plenty of time to exploit the system's vulnerabilities and thus they are able to choose when to launch attacks wisely to maximize the damage. An unpredictable system ...

research-article
Public Access
SDN based Scalable MTD solution in Cloud Network

Software-Defined Networking (SDN) has emerged as a framework for centralized command and control in cloud data centric environments. SDN separates data and control plane, which provides network administrator better visibility and policy enforcement ...

SESSION: Paper Session: New Moving Target Defenses (II)
research-article
Public Access
A Moving Target Defense Approach to Disrupting Stealthy Botnets

Botnets are increasingly being used for exfiltrating sensitive data from mission-critical systems. Research has shown that botnets have become extremely sophisticated and can operate in stealth mode by minimizing their host and network footprint. In ...

research-article
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers

While existing proactive-based paradigms such as address mutation are effective in slowing down reconnaissance by naive attackers, they are ineffective against skilled human attackers. In this paper, we analytically show that the goal of defeating ...

short-paper
Mayflies: A Moving Target Defense Framework for Distributed Systems

prevent attackers from gaining control of the system using well established techniques such as; perimeter-based fire walls, redundancy and replications, and encryption. However, given sufficient time and resources, all these methods can be defeated. ...

DEMONSTRATION SESSION: System Demo
demonstration
Public Access
Demo: A Symbolic N-Variant System

This demo paper describes an approach to detect memory corruption attacks using artificial diversity. Our approach conducts offline symbolic execution of multiple variants of a system to identify paths which diverge in different variants. In addition, ...

SESSION: Invited Industry Talk
research-article
Moving Target Defense: a Journey from Idea to Product

In today's enterprise networks, there are many ways for a determined attacker to obtain a foothold, bypass current protection technologies, and attack the intended target. Over several years we have developed the Self-shielding Dynamic Network ...

SESSION: Paper Session: Modeling and Evaluation of Moving Target Defenses
research-article
Public Access
Markov Modeling of Moving Target Defense Games

We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of a broad range of MTD strategies, provides general theorems about how the probability of a successful adversary defeating an MTD ...

research-article
Public Access
Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis

Distributed denial-of-service attacks are an increasing problem facing web applications, for which many defense techniques have been proposed, including several moving-target strategies. These strategies typically work by relocating targeted services ...

research-article
Dependency Graph Analysis and Moving Target Defense Selection

Moving target defense (MTD) is an emerging paradigm in which system defenses dynamically mutate in order to decrease the overall system attack surface. Though the concept is promising, implementations have not been widely adopted. The field has been ...

research-article
Public Access
Formal Approach for Resilient Reachability based on End-System Route Agility

The deterministic nature of existing routing protocols has resulted into an ossified Internet with static and predictable network routes. This gives persistent attackers (e.g. eavesdroppers and DDoS attackers) plenty of time to study the network and ...

short-paper
Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks

In this paper, we describe the results of several experiments designed to test two dynamic network moving target defenses against a propagating data exfiltration attack. We designed a collection of metrics to assess the costs to mission activities and ...

Contributors
  • Pennsylvania State University
  • NC State University
Index terms have been assigned to the content through auto-classification.
Please enable JavaScript to view thecomments powered by Disqus.

Recommendations

Acceptance Rates

MTD '16 Paper Acceptance Rate 9 of 26 submissions, 35%;
Overall Acceptance Rate 40 of 92 submissions, 43%
YearSubmittedAcceptedRate
MTD '1855100%
MTD '1726935%
MTD '1626935%
MTD '1519842%
MTD '1416956%
Overall924043%