Article
Computer Science, Hardware & Architecture
Warren Connell, Daniel A. Menasce, Massimiliano Albanese
Summary: Moving Target Defense (MTD) has emerged as a game changer in security due to its ability to introduce asymmetric uncertainty, giving defenders a tactical advantage. However, there are still critical gaps in studying and quantifying the cost and benefits of deploying MTDs, despite the progress made in this field. Existing techniques address only a narrow set of attack vectors, making it difficult to quantify and compare multiple techniques.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
(2021)
Review
Chemistry, Multidisciplinary
Rongbo Sun, Yuefei Zhu, Jinlong Fei, Xingyu Chen
Summary: Represented by reactive security defense mechanisms, cyber defense is currently static, reactive, and costly. Moving target defense (MTD) introduces a new approach with the goal of providing dynamic, continuous, and proactive defense. MTD techniques leveraging machine learning have shown promise in reducing costs and providing effective defense capabilities. However, research in this area is fragmented and more progress is needed to build a robust and available defense mechanism. Therefore, we conducted a comprehensive survey to provide insight into the design and limitations of MTD, as well as intelligent MTD features to overcome these limitations.
APPLIED SCIENCES-BASEL
(2023)
Article
Automation & Control Systems
J. Giraldo, A. Cardenas, R. G. Sanfelice
Summary: This paper presents a Moving Target Defense (MTD) algorithm that enhances security by randomly changing the availability of sensor data. It aims to make it difficult for adversaries to predict the effect of their attacks and minimize the impact of false data injection attacks. Through optimization problems, the algorithm finds the probability of switching signals to increase the visibility of stealthy attacks and reduce the deviation caused by false data injection attacks. The algorithm guarantees system stability with desired performance and demonstrates its effectiveness through case studies.
NONLINEAR ANALYSIS-HYBRID SYSTEMS
(2023)
Article
Computer Science, Information Systems
Zhenyong Zhang, Youliang Tian, Ruilong Deng, Jianfeng Ma
Summary: The article proposes a double-benefit moving target defense (dB-MTD) to protect the smart grid (SG) from cyber-physical attacks (CPAs) and gain generation-cost benefits. By perturbing reactances with distributed flexible AC transmission system (D-FACTS) to prevent stealthy CPAs on transmission lines, the optimal reactance perturbations are computed to maximize generation-cost benefits without sacrificing the protection performance of dB-MTD. Extensive simulations using real-world load profiles evaluate the impact of CPAs on the system operation and benefits obtained by dB-MTD in terms of D-FACTS deployment and generation-cost profits.
IEEE INTERNET OF THINGS JOURNAL
(2022)
Article
Telecommunications
Yu Zheng, Zheng Li, Xiaolong Xu, Qingzhan Zhao
Summary: Driven by the rapid development of the Internet of Things and cloud computing, cyberspace has become the fifth dimension of human activities. However, the security problems in cyberspace are becoming increasingly serious. Traditional defense measures often fail to effectively respond to new types of intelligent network attacks. Therefore, there is a need for research on dynamic defense mechanisms to reverse the asymmetric situation of defense and attack in cyberspace.
DIGITAL COMMUNICATIONS AND NETWORKS
(2022)
Article
Telecommunications
Yu Zheng, Zheng Li, Xiaolong Xu, Qingzhan Zhao
Summary: With the rapid development of emerging technologies, the connotation of cyberspace is constantly expanding and becoming the fifth dimension of human activities, but security issues in cyberspace are becoming serious. Dynamic defense mechanisms play an important role in cyber security, but there is still limited research and analysis on related works and concepts, necessitating further in-depth and systematic investigation.
DIGITAL COMMUNICATIONS AND NETWORKS
(2022)
Article
Computer Science, Theory & Methods
Giulio Pagnotta, Fabio De Gaspari, Dorjan Hitaj, Mauro Andreolini, Michele Colajanni, Luigi V. Mancini
Summary: This paper presents DOLOS, a novel architecture that unifies Cyber Deception and Moving Target Defense approaches and seamlessly integrates them into production systems. Through multiple layers of isolation, DOLOS effectively slows down attacks and protects the integrity of production systems.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY
(2023)
Article
Computer Science, Information Systems
Sang Seo, Heaeun Moon, Sunho Lee, Donghyeon Kim, Jaeyeon Lee, Byeongjin Kim, Woojin Lee, Dohoon Kim
Summary: Based on the paradigm shift in modern warfare, this research proposes the concept of active moving-target-defense (MTD), which minimizes the rate of success of cyber-attacks on drones by considering both internal and external operation sequences. A drone-based defensive deception game framework (D3GF) was developed and simulated to optimally design the proposed drone-type MTD. The study aims to compare the efficiencies of deceptive defense in unique environmental features and provide a detailed performance evaluation.
Article
Computer Science, Information Systems
Jiazhou Wang, Jue Tian, Yang Liu, Dong Yang, Ting Liu
Summary: This paper proposes a multistage moving target defense (MMTD) approach to detect FDI attacks in D-FACTS devices. The MMTD adds security-oriented schemes before the economy-oriented scheme, significantly improving the detection capability compared to existing MTDs. The relationship between MMTD's detection capability and system topology and D-FACTS deployment is studied, and a greedy algorithm is proposed to search for the optimal MMTD strategy.
IEEE INTERNET OF THINGS JOURNAL
(2023)
Article
Automation & Control Systems
Hao Liu, Yewei Zhang, Yuzhe Li, Ben Niu
Summary: In this paper, the attack detection problem is investigated for cyber-physical systems (CPSs) with unknown-but-bounded (UBB) noises. A new hybrid proactive detection scheme is proposed to detect stealthy attacks by combining watermarking and moving target (MT). The designed abnormal detector is based on the residual of the zonotopic observer which can be utilized to estimate states of the system with UBB noises. We prove that the approach proposed in this work does not introduce any performance loss in the absence of attacks. The proposed active detection framework can be employed to detect various types of attacks, such as denial-of-service (DoS), replay and covert attacks. Finally, numerical examples are provided to demonstrate the effectiveness of the proposed methods.
Article
Computer Science, Information Systems
Jian Yu, Qiang Li
Summary: This study proposes a method for the intelligent deployment of distributed flexible AC transmission system (D-FACTS) devices. By considering practical constraints and the basic concept, a protected transmission line set is determined, and a robust Nash equilibrium solution is computed to reflect smart attackers' sense of action. Finally, a comprehensive algorithm based on a metric proposed in previous research is presented to find an intelligent solution for deploying D-FACTS devices.
Review
Computer Science, Information Systems
Renzo E. Navas, Frederic Cuppens, Nora Boulahia Cuppens, Laurent Toutain, Georgios Z. Papadopoulos
Summary: Through a systematic literature review, researchers found that there are numerous MTD techniques suitable for IoT, with many lacking strong security foundations, but some showing strong evidence of real-world deployment. The state of the art in this field is still immature, with a need for new techniques to prioritize providing convincing security foundations and evidence of real-world deployment.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Lukasz Jalowski, Marek Zmuda, Mariusz Rawski
Summary: This survey aims to analyze the current issues and future improvements in the field of MTD, in order to make it a viable solution for addressing real-life network security threats.
Article
Computer Science, Information Systems
Pedro Escaleira, Vitor A. Cunha, Diogo Gomes, Joao P. Barraca, Rui L. Aguiar
Summary: The development of IoT has positively impacted 5G technology, but also faces security risks associated with it. One major security issue is the risk brought by network virtualization and softwarization. To address these problems, a Moving Target Defense approach is proposed to protect cloud-based network functions. Experimental results have shown that this approach can effectively delay and prevent attackers from achieving their objectives.
INTERNET OF THINGS
(2023)
Article
Computer Science, Hardware & Architecture
Bradley Potteiger, Abhishek Dubey, Feiyang Cai, Xenofon Koutsoukos, Zhenkai Zhang
Summary: Memory corruption attacks pose a threat to the security of Cyber-Physical Systems. To protect systems against these attacks, moving target defense techniques can be applied in a mixed time and event-triggered architecture. This paper proposes a mixed time and event-triggered MTD security approach based on the ARINC 653 architecture, and its effectiveness is demonstrated through experiments.
JOURNAL OF SYSTEMS ARCHITECTURE
(2022)