It is our great pleasure to welcome you to the 2016 MTD (Moving Target Defense) Workshop. This workshop seeks to bring together researchers from academia, government, and industry to report on the latest results on moving-target defense research, and to have productive discussion and constructive debate on this topic. The workshop is a single day event co-located with the 2016 ACM Conference on Computer and Communications Security (ACM CCS). Out of a total of 26 submissions from Asia, Europe, and North America, we accepted 9 regular papers and 2 short papers. In addition, we have accepted one system demo.
We also encourage attendees to attend the keynote and invited talk presentations. These valuable and insightful talks will give us a better understanding of the future:
A Cyber Mutation: Metrics, Techniques and Future Directions, Ehab Al-Shaer (who is currently at UNC Charlotte)
Moving Target Defense - A Journey from Idea to Product, Jason Li (who is currently at Intelligent Automation, Inc.)
Proceeding Downloads
A Cyber Mutation: Metrics, Techniques and Future Directions
After decades of cyber warfare, it is well-known that the static and predictable behavior of cyber configuration provides a great advantage to adversaries to plan and launch their attack successfully. At the same time, as cyber attacks are getting ...
Have No PHEAR: Networks Without Identifiers
Network protocols such as Ethernet and TCP/IP were not designed to ensure the security and privacy of users. To protect users' privacy, anonymity networks such as Tor have been proposed to hide both identities and communication contents for Internet ...
Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks
Traditionally, network and system configurations are static. Attackers have plenty of time to exploit the system's vulnerabilities and thus they are able to choose when to launch attacks wisely to maximize the damage. An unpredictable system ...
SDN based Scalable MTD solution in Cloud Network
Software-Defined Networking (SDN) has emerged as a framework for centralized command and control in cloud data centric environments. SDN separates data and control plane, which provides network administrator better visibility and policy enforcement ...
A Moving Target Defense Approach to Disrupting Stealthy Botnets
Botnets are increasingly being used for exfiltrating sensitive data from mission-critical systems. Research has shown that botnets have become extremely sophisticated and can operate in stealth mode by minimizing their host and network footprint. In ...
Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers
While existing proactive-based paradigms such as address mutation are effective in slowing down reconnaissance by naive attackers, they are ineffective against skilled human attackers. In this paper, we analytically show that the goal of defeating ...
Mayflies: A Moving Target Defense Framework for Distributed Systems
prevent attackers from gaining control of the system using well established techniques such as; perimeter-based fire walls, redundancy and replications, and encryption. However, given sufficient time and resources, all these methods can be defeated. ...
Demo: A Symbolic N-Variant System
This demo paper describes an approach to detect memory corruption attacks using artificial diversity. Our approach conducts offline symbolic execution of multiple variants of a system to identify paths which diverge in different variants. In addition, ...
Moving Target Defense: a Journey from Idea to Product
In today's enterprise networks, there are many ways for a determined attacker to obtain a foothold, bypass current protection technologies, and attack the intended target. Over several years we have developed the Self-shielding Dynamic Network ...
Markov Modeling of Moving Target Defense Games
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of a broad range of MTD strategies, provides general theorems about how the probability of a successful adversary defeating an MTD ...
Moving Target Defense against DDoS Attacks: An Empirical Game-Theoretic Analysis
Distributed denial-of-service attacks are an increasing problem facing web applications, for which many defense techniques have been proposed, including several moving-target strategies. These strategies typically work by relocating targeted services ...
Dependency Graph Analysis and Moving Target Defense Selection
Moving target defense (MTD) is an emerging paradigm in which system defenses dynamically mutate in order to decrease the overall system attack surface. Though the concept is promising, implementations have not been widely adopted. The field has been ...
Formal Approach for Resilient Reachability based on End-System Route Agility
The deterministic nature of existing routing protocols has resulted into an ossified Internet with static and predictable network routes. This gives persistent attackers (e.g. eavesdroppers and DDoS attackers) plenty of time to study the network and ...
Automated Effectiveness Evaluation of Moving Target Defenses: Metrics for Missions and Attacks
In this paper, we describe the results of several experiments designed to test two dynamic network moving target defenses against a propagating data exfiltration attack. We designed a collection of metrics to assess the costs to mission activities and ...
Cited By
-
Dang F, Wu K, Li S, Liu H, Song Y, Zhang X, Cai X and Ahmad B (2023). Dynamic moving target defense strategy based on adaptive port hopping in SDN Third International Conference on Computer Network Security and Software Engineering (CNSSE 2023), 10.1117/12.2683442, 9781510666511, (71)
-
Chen J, Zhu Q, Pham K and Chen G (2019). A games-in-games approach to mosaic command and control design of dynamic network-of-networks for secure and resilient multi-domain operations Sensors and Systems for Space Applications XII, 10.1117/12.2526677, 9781510626997, (28)
Index Terms
- Proceedings of the 2016 ACM Workshop on Moving Target Defense