Moving Target Defense II Application of Game Theory and Adversarial Modeling /
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment.� Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment.� We need a new class of defensive strategies that would force advers...
Corporate Author: | |
---|---|
Other Authors: | , , , , , |
Format: | Electronic |
Language: | English |
Published: |
New York, NY :
Springer New York : Imprint: Springer,
2013.
|
Series: | Advances in Information Security,
100 |
Subjects: | |
Online Access: | https://ezaccess.library.uitm.edu.my/login?url=http://dx.doi.org/10.1007/978-1-4614-5416-8 |
Table of Contents:
- Game Theoretic Approaches to Attack Surface Shifting
- Security Games Applied to Real-World
- Adversarial Dynamics: The Conficker Case Study
- From Individual Decisions from Experience to Behavioral Game Theory
- Cyber Maneuver Against External Adversaries and Compromised Nodes
- Applying Self-shielding Dynamics to the Network Architecture
- Moving Target Defenses in the Helix Self-Regenerative Architecture
- Diversifying the Software Stack using Randomized NOP Insertion
- Practical Software Diversification Using In-Place Code Randomization.