Moving Target Defense

Creating Asymmetric Uncertainty for Cyber Threats

  • Sushil Jajodia
  • Anup K. Ghosh
  • Vipin Swarup
  • Cliff Wang
  • X. Sean Wang
Part of the Advances in Information Security book series (ADIS, volume 54)

Table of contents

  1. Front Matter
    Pages i-xv
  2. Pratyusa K. Manadhata, Jeannette M. Wing
    Pages 1-28
  3. David Evans, Anh Nguyen-Tuong, John Knight
    Pages 29-48
  4. Georgios Portokalidis, Angelos D. Keromytis
    Pages 49-76
  5. Todd Jackson, Babak Salamat, Andrei Homescu, Karthikeyan Manivannan, Gregor Wagner, Andreas Gal et al.
    Pages 77-98
  6. Ang Cui, Salvatore J. Stolfo
    Pages 99-108
  7. Mihai Christodorescu, Matthew Fredrikson, Somesh Jha, Jonathon Giffin
    Pages 117-130
  8. Back Matter
    Pages 183-183

About this book

Introduction

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more.

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

Keywords

Adversary Cyber security Defense Information Assurance Infrastructure Network Security

Editors and affiliations

  • Sushil Jajodia
    • 1
  • Anup K. Ghosh
    • 2
  • Vipin Swarup
    • 3
  • Cliff Wang
    • 4
  • X. Sean Wang
    • 5
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  2. 2.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  3. 3.The MITRE CorporationMcLeanUSA
  4. 4.Computing and Information Science Div.Engineering Sciences DirectorateTriangle ParkUSA
  5. 5.Division of Information & Intelligent SyNational Science FoundationArlingtonUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-1-4614-0977-9
  • Copyright Information Springer Science+Business Media, LLC 2011
  • Publisher Name Springer, New York, NY
  • eBook Packages Computer Science
  • Print ISBN 978-1-4614-0976-2
  • Online ISBN 978-1-4614-0977-9
  • Series Print ISSN 1568-2633
  • About this book