Academic literature on the topic 'Moving Target IPv6 Defense'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Moving Target IPv6 Defense.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Moving Target IPv6 Defense"

1

G.S, Geethamani. "A Review on Secure VPN using Network IPV6 based Moving Target Defense." International Journal for Research in Applied Science and Engineering Technology 6, no. 3 (2018): 1369–73. http://dx.doi.org/10.22214/ijraset.2018.3209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zeitz, Kimberly, Michael Cantrell, Randy Marchany, and Joseph Tront. "Changing the Game: A Micro Moving Target IPv6 Defense for the Internet of Things." IEEE Wireless Communications Letters 7, no. 4 (2018): 578–81. http://dx.doi.org/10.1109/lwc.2018.2797916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Basam, Dileep, J. Scot Ransbottom, Randy Marchany, and Joseph G. Tront. "Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities." Journal of Electrical and Computer Engineering 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/5212314.

Full text
Abstract:
Moving Target IPv6 Defense (MT6D) imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts implemented a solution to identify and acquire these old addresses that are being discarded by MT6D hosts on a local network besides being able to monitor and visualize the incoming traffic on these addresses. This was essentially equivalent to forming a darknet out of the discarded MT6D addresses, but the solution presented in the previous research effort did not include databa
APA, Harvard, Vancouver, ISO, and other styles
4

Lei, Cheng, Hong-Qi Zhang, Jing-Lei Tan, Yu-Chen Zhang, and Xiao-Hu Liu. "Moving Target Defense Techniques: A Survey." Security and Communication Networks 2018 (July 22, 2018): 1–25. http://dx.doi.org/10.1155/2018/3759626.

Full text
Abstract:
As an active defense technique to change asymmetry in cyberattack-defense confrontation, moving target defense research has become one of the hot spots. In order to gain better understanding of moving target defense, background knowledge and inspiration are expounded at first. Based on it, the concept of moving target defense is analyzed. Secondly, literature analysis method is adopted to explain the design principles and system architecture of moving target defense. In addition, some relevant key techniques are introduced from the aspects of strategy generation, shuffling implementation, and
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Huangxin, Quan Jia, Dan Fleck, Walter Powell, Fei Li, and Angelos Stavrou. "A moving target DDoS defense mechanism." Computer Communications 46 (June 2014): 10–21. http://dx.doi.org/10.1016/j.comcom.2014.03.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cho, Jin-Hee, Dilli P. Sharma, Hooman Alavizadeh, et al. "Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense." IEEE Communications Surveys & Tutorials 22, no. 1 (2020): 709–45. http://dx.doi.org/10.1109/comst.2019.2963791.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Heydari, Vahid. "Moving Target Defense for Securing SCADA Communications." IEEE Access 6 (2018): 33329–43. http://dx.doi.org/10.1109/access.2018.2844542.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alnemari, Shouq Mohsen, and Sabah M. Alzahrani. "On Moving Target Techniques for Network Defense Security." International Journal of Recent Technology and Engineering 9, no. 5 (2021): 84–90. http://dx.doi.org/10.35940/ijrte.e5111.019521.

Full text
Abstract:
The traditional technologies, tools and procedures of any network cannot be protected from attackers due to the unchanged services and configurations of the networks. To get rid of the asymmetrical feature, Moving Target Defense technique constantly changes the platform conformation which reduces success ratio of the cyberattack. Users are faced with realness with the increase of continual, progressive, and smart attacks. However, the defenders often follow the attackers in taking suitable action to frustrate expected attackers. The moving target defense idea appeared as a preemptive protect m
APA, Harvard, Vancouver, ISO, and other styles
9

Ge, Mengmeng, Jin-Hee Cho, Dongseong Kim, Gaurav Dixit, and Ing-Ray Chen. "Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception." ACM Transactions on Internet Technology 22, no. 1 (2022): 1–31. http://dx.doi.org/10.1145/3467021.

Full text
Abstract:
Resource constrained Internet-of-Things (IoT) devices are highly likely to be compromised by attackers, because strong security protections may not be suitable to be deployed. This requires an alternative approach to protect vulnerable components in IoT networks. In this article, we propose an integrated defense technique to achieve intrusion prevention by leveraging cyberdeception (i.e., a decoy system) and moving target defense (i.e., network topology shuffling). We evaluate the effectiveness and efficiency of our proposed technique analytically based on a graphical security model in a softw
APA, Harvard, Vancouver, ISO, and other styles
10

Vuppala, Satyanarayana, Alie El-Din Mady, and Adam Kuenzi. "Moving Target Defense Mechanism for Side-Channel Attacks." IEEE Systems Journal 14, no. 2 (2020): 1810–19. http://dx.doi.org/10.1109/jsyst.2019.2922589.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Moving Target IPv6 Defense"

1

DiMarco, Peter Lewis. "Evaluation of Moving Target IPv6 Defense and Distributed Denial of Service Defenses." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/24697.

Full text
Abstract:
A Denial-of-Service (DoS) attack is a network attack from a single machine that attempts to prevent the victim, the targeted machine, from communicating to other devices on the network or perform its normal tasks. The extension of these attacks to include many malicious machines became known as Distributed Denial-of-Service (DDoS) attacks. DDoS attacks cause an immense amount of strain on both the victim and the devices used to reach the victim. In reaction to these attacks, preexisting technologies were used as DDoS defenses to mitigate the effects. The two most notable defenses used are the
APA, Harvard, Vancouver, ISO, and other styles
2

Zeitz, Kimberly Ann. "Cybersecurity for the Internet of Things: A Micro Moving Target IPv6 Defense." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/102446.

Full text
Abstract:
As the use of low-power and low-resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advances the knowledge in the area of cybersecurity for the IoT through the exploration of a moving target defense to apply for limiting the time attackers may conduct reconnaissance on embedded systems while considering the challenges presented from IoT devices such as resource and performance constraints. We introduce the design and optimizations for
APA, Harvard, Vancouver, ISO, and other styles
3

Sherburne, Matthew Gilbert. "Micro-Moving Target IPv6 Defense for 6LoWPAN and the Internet of Things." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/52043.

Full text
Abstract:
The Internet of Things (IoT) is composed of billions of sensors and actuators that have varying tasks aimed at making industry, healthcare, and home life more efficient. These sensors and actuators are mainly low-powered and resource-constrained embedded devices with little room for implementing IP security in addition to their main function. With the fact that more of these devices are using IPv6 addressing, we seek to adapt a moving-target defense measure called Moving Target IPv6 Defense for use with embedded devices in order to add an additional layer of security. This adaptation, which we
APA, Harvard, Vancouver, ISO, and other styles
4

Hardman, Owen Russell. "Optimizing a Network Layer Moving Target Defense by Translating Software from Python to C." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/64435.

Full text
Abstract:
The security of powerful systems and large networks is often addressed through complex defenses. While these types of defenses offer increased security, they are resource intensive and therefore impractical to implement on many new classes of networked systems, such as mobile phones and small, embedded network infrastructure devices. To provide security for these systems, new defenses must be created that provide highly efficient security. The Moving Target IPv6 Defense (MT6D) is a network layer moving target defense that dynamically changes Internet Protocol version 6 (IPv6) addresses mid-ses
APA, Harvard, Vancouver, ISO, and other styles
5

Sagisi, Joseph Lozano. "HE-MT6D: A Network Security Processor with Hardware Engine for Moving Target IPv6 Defense (MT6D) over 1 Gbps IEEE 802.3 Ethernet." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/86789.

Full text
Abstract:
Traditional static network addressing allows attackers the incredible advantage of taking time to plan and execute attacks against a network. To counter, Moving Target IPv6 Defense (MT6D) provides a network host obfuscation technique that dynamically obscures network and transport layer addresses. Software driven implementations have posed many challenges, namely, constant code maintenance to remain compliant with all library and kernel dependencies, less than optimal throughput, and the requirement for a dedicated general purpose hardware. The work of this thesis presents Network Security Pro
APA, Harvard, Vancouver, ISO, and other styles
6

Basam, Dileep Kumar. "Strengthening MT6D Defenses with Darknet and Honeypot capabilities." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/64375.

Full text
Abstract:
With the ever increasing adoption of IPv6, there has been a growing concern for security and privacy of IPv6 networks. Mechanisms like the Moving Target IPv6 Defense (MT6D) leverage the immense address space available with the new 128-bit addressing scheme to improve security and privacy of IPv6 networks. MT6D allows participating hosts to hop onto new addresses, that are cryptographically computed, without any disruption to ongoing conversations. However, there is no feedback mechanism in the current MT6D implementation to substantiate the core strength of the scheme i.e., to find an attack
APA, Harvard, Vancouver, ISO, and other styles
7

Dunlop, Matthew William. "Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77333.

Full text
Abstract:
Society's increased use of network applications, such as email, social networking, and web browsing, creates a massive amount of information floating around in cyber space. An attacker can collect this information to build a profile of where people go, what their interests are, and even what they are saying to each other. For certain government and corporate entities, the exposure of this information could risk national security or loss of capital. This work identifies vulnerabilities in the way the Internet Protocol version 6 (IPv6) forms addresses. These vulnerabilities provide attackers wit
APA, Harvard, Vancouver, ISO, and other styles
8

Morrell, Christopher Frank. "Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/79791.

Full text
Abstract:
The amount of data that is shared on the Internet is growing at an alarming rate. Current estimates state that approximately 2.5 exabytes of data were generated every day in 2012. This rate is only growing as people continue to increase their on-line presence. As the amount of data grows, so too do the number of people who are attempting to gain access to the data. Attackers try many methods to gain access to information, including a number of attacks that occur at the network layer. A network-based moving target defense is a technique that obfuscates the location of a machine on the Inter
APA, Harvard, Vancouver, ISO, and other styles
9

Zhuang, Rui. "A theory for understanding and quantifying moving target defense." Diss., Kansas State University, 2015. http://hdl.handle.net/2097/20525.

Full text
Abstract:
Doctor of Philosophy<br>Computing and Information Sciences<br>Scott A. DeLoach<br>The static nature of cyber systems gives attackers a valuable and asymmetric advantage - time. To eliminate this asymmetric advantage, a new approach, called Moving Target Defense (MTD) has emerged as a potential solution. MTD system seeks to proactively change system configurations to invalidate the knowledge learned by the attacker and force them to spend more effort locating and re-locating vulnerabilities. While it sounds promising, the approach is so new that there is no standard definition of what an MTD is
APA, Harvard, Vancouver, ISO, and other styles
10

Navas, Renzo Efraín. "Improving the resilience of the constrained Internet of Things : a moving target defense approach." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0217.

Full text
Abstract:
Les systèmes de l’Internet des Objets (IoT) sont de plus en plus déployés dans le monde réel, mais leur sécurité est en retard par rapport à l’état de l’art des systèmes non IoT. La Défense par Cible Mouvante (MTD) est un paradigme de cyberdéfense qui propose de randomiser les composants des systèmes, dans l’intention de faire échec aux cyberattaquants qui s’appuyaient auparavant sur la nature statique des systèmes. Les attaquants sont désormais limités par le temps. Le MTD a été mis en œuvre avec succès dans les systèmes conventionnels, mais son utilisation pour améliorer la sécurité des IoT
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Moving Target IPv6 Defense"

1

Jajodia, Sushil, Anup K. Ghosh, Vipin Swarup, Cliff Wang, and X. Sean Wang, eds. Moving Target Defense. Springer New York, 2011. http://dx.doi.org/10.1007/978-1-4614-0977-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jajodia, Sushil, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, and X. Sean Wang, eds. Moving Target Defense II. Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-5416-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shetty, Sachin, Xuebiao Yuchi, and Min Song. Moving Target Defense for Distributed Systems. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31032-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Moving target defense: Creating asymmetric uncertainty for cyber threats. Springer, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jajodia, Sushil. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Song, Min, Sachin Shetty, and Xuebiao Yuchi. Moving Target Defense for Distributed Systems. Springer, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Song, Min, Sachin Shetty, and Xuebiao Yuchi. Moving Target Defense for Distributed Systems. Springer, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup, and X. Sean Wang. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jajodia, Sushil, Anup K. Ghosh, and V. S. Subrahmanian. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jajodia, Sushil, Anup K. Ghosh, Cliff Wang, V. S. Subrahmanian, Vipin Swarup, and X. Sean Wang. Moving Target Defense II: Application of Game Theory and Adversarial Modeling. Springer, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Moving Target IPv6 Defense"

1

Huang, Dijiang, Ankur Chowdhary, and Sandeep Pisharody. "Moving Target Defense." In Software-Defined Networking and Security. CRC Press, 2018. http://dx.doi.org/10.1201/9781351210768-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Albanese, Massimiliano, Warren Connell, Sridhar Venkatesan, and George Cybenko. "Moving Target Defense Quantification." In Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Manadhata, Pratyusa K. "Game Theoretic Approaches to Attack Surface Shifting." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jain, Manish, Bo An, and Milind Tambe. "Security Games Applied to Real-World: Research Contributions and Challenges." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bilar, Daniel, George Cybenko, and John Murphy. "Adversarial Dynamics: The Conficker Case Study." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gonzalez, Cleotilde. "From Individual Decisions from Experience to Behavioral Game Theory: Lessons for Cybersecurity." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Torrieri, Don, Sencun Zhu, and Sushil Jajodia. "Cyber Maneuver Against External Adversaries and Compromised Nodes." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yackoski, Justin, Harry Bullen, Xiang Yu, and Jason Li. "Applying Self-Shielding Dynamics to the Network Architecture." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Goues, Claire Le, Anh Nguyen-Tuong, Hao Chen, et al. "Moving Target Defenses in the Helix Self-Regenerative Architecture." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jackson, Todd, Andrei Homescu, Stephen Crane, Per Larsen, Stefan Brunthaler, and Michael Franz. "Diversifying the Software Stack Using Randomized NOP Insertion." In Moving Target Defense II. Springer New York, 2012. http://dx.doi.org/10.1007/978-1-4614-5416-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Moving Target IPv6 Defense"

1

Dunlop, Matthew, Stephen Groat, William Urbanski, Randy Marchany, and Joseph Tront. "MT6D: A Moving Target IPv6 Defense." In MILCOM 2011 - 2011 IEEE Military Communications Conference. IEEE, 2011. http://dx.doi.org/10.1109/milcom.2011.6127486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Heydari, Vahid, Seong-Moo Yoo, and Sun-il Kim. "Secure VPN Using Mobile IPv6 Based Moving Target Defense." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Heydari, Vahid, Sun-il Kim, and Seong-Moo Yoo. "Anti-Censorship Framework using Mobile IPv6 based Moving Target Defense." In CISRC '16: 11th Annual Cyber and Information Security Research. ACM, 2016. http://dx.doi.org/10.1145/2897795.2897815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Morrell, Christopher, J. Scot Ransbottom, Randy Marchany, and Joseph G. Tront. "Scaling IPv6 address bindings in support of a moving target defense." In 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST). IEEE, 2014. http://dx.doi.org/10.1109/icitst.2014.7038852.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Groat, Stephen, Matthew Dunlop, William Urbanksi, Randy Marchany, and Joseph Tront. "Using an IPv6 moving target defense to protect the Smart Grid." In 2012 IEEE PES Innovative Smart Grid Technologies (ISGT). IEEE, 2012. http://dx.doi.org/10.1109/isgt.2012.6175633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zeitz, Kimberly, Michael Cantrell, Randy Marchany, and Joseph Tront. "Designing a Micro-Moving Target IPv6 Defense for the Internet of Things." In IoTDI '17: International Conference on Internet-of-Things Design and Implementation. ACM, 2017. http://dx.doi.org/10.1145/3054977.3054997.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chatfield, Brycent, and Rami J. Haddad. "Moving Target Defense Intrusion Detection System for IPv6 based smart grid advanced metering infrastructure." In SoutheastCon 2017. IEEE, 2017. http://dx.doi.org/10.1109/secon.2017.7925307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sagisi, Joseph, Joseph Tront, and Randy Marchany. "System architectural design of a hardware engine for moving target IPv6 defense over IEEE 802.3 Ethernet." In 2017 IEEE Military Communications Conference (MILCOM). IEEE, 2017. http://dx.doi.org/10.1109/milcom.2017.8170846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sherburne, Matthew, Randy Marchany, and Joseph Tront. "Implementing moving target IPv6 defense to secure 6LoWPAN in the internet of things and smart grid." In the 9th Annual Cyber and Information Security Research Conference. ACM Press, 2014. http://dx.doi.org/10.1145/2602087.2602107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sagisi, Joseph, Joseph Tront, and Randy Marchany Bradley. "Platform agnostic, scalable, and unobtrusive FPGA network processor design of moving target defense over IPv6 (MT6D) over IEEE 802.3 Ethernet." In 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2017. http://dx.doi.org/10.1109/hst.2017.7951829.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Moving Target IPv6 Defense"

1

Jones, Stephen T., Alexander V. Outkin, Jared Lee Gearhart, et al. Evaluating Moving Target Defense with PLADD. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1222986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jenkins, Christipher D. Moving Target Defense for Space Systems. Office of Scientific and Technical Information (OSTI), 2019. http://dx.doi.org/10.2172/1592959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fink, Glenn A., and Christopher S. Oehmen. Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1059207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!