Moving Target Defense II Application of Game Theory and Adversarial Modeling /

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment.� Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment.� We need a new class of defensive strategies that would force advers...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Jajodia, Sushil. (Editor), Ghosh, Anup K. (Editor), Subrahmanian, V.S. (Editor), Swarup, Vipin. (Editor), Wang, Cliff. (Editor), Wang, X. Sean. (Editor)
Format: Electronic
Language:English
Published: New York, NY : Springer New York : Imprint: Springer, 2013.
Series:Advances in Information Security, 100
Subjects:
Online Access:https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4614-5416-8
Table of Contents:
  • Game Theoretic Approaches to Attack Surface Shifting
  • Security Games Applied to Real-World
  • Adversarial Dynamics: The Conficker Case Study
  • From Individual Decisions from Experience to Behavioral Game Theory
  • Cyber Maneuver Against External Adversaries and Compromised Nodes
  • Applying Self-shielding Dynamics to the Network Architecture
  • Moving Target Defenses in the Helix Self-Regenerative Architecture
  • Diversifying the Software Stack using Randomized NOP Insertion
  • Practical Software Diversification Using In-Place Code Randomization.