Markov modeling of moving target defense games

Hoda Maleki, Saeed Valizadeh, William Koch, Azer Bestavros, Marten Van Dijk

Research output: Chapter in Book/Report/Conference proceedingConference contribution

79 Scopus citations

Abstract

We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of a broad range of MTD strategies, provides general theorems about how the probability of a successful adversary defeating an MTD strategy is related to the amount of time/cost spent by the adversary, and shows how a multilevel composition of MTD strategies can be analyzed by a straightforward combination of the analysis for each one of these strategies. Within the proposed framework we define the concept of security capacity which measures the strength or effectiveness of an MTD strategy: the security capacity depends on MTD specific parameters and more general system parameters. We apply our framework to two concrete MTD strategies.

Original languageEnglish (US)
Title of host publicationMTD 2016 - Proceedings of the 2016 ACM Workshop on Moving Target Defense, co-located with CCS 2016
PublisherAssociation for Computing Machinery, Inc
Pages81-92
Number of pages12
ISBN (Electronic)9781450345705
DOIs
StatePublished - Oct 24 2016
Externally publishedYes
Event2016 ACM Workshop on Moving Target Defense, MTD 2016 - Vienna, Austria
Duration: Oct 24 2016 → …

Publication series

NameMTD 2016 - Proceedings of the 2016 ACM Workshop on Moving Target Defense, co-located with CCS 2016

Conference

Conference2016 ACM Workshop on Moving Target Defense, MTD 2016
Country/TerritoryAustria
CityVienna
Period10/24/16 → …

Keywords

  • IP hopping
  • Markov models
  • Moving target defense
  • Security capacity
  • Single/multiple-target hiding

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Control and Systems Engineering
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Markov modeling of moving target defense games'. Together they form a unique fingerprint.

Cite this