Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Moving Target Defense.

Thèses sur le sujet « Moving Target Defense »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 22 meilleures thèses pour votre recherche sur le sujet « Moving Target Defense ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

DiMarco, Peter Lewis. "Evaluation of Moving Target IPv6 Defense and Distributed Denial of Service Defenses." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/24697.

Texte intégral
Résumé :
A Denial-of-Service (DoS) attack is a network attack from a single machine that attempts to prevent the victim, the targeted machine, from communicating to other devices on the network or perform its normal tasks. The extension of these attacks to include many malicious machines became known as Distributed Denial-of-Service (DDoS) attacks. DDoS attacks cause an immense amount of strain on both the victim and the devices used to reach the victim. In reaction to these attacks, preexisting technologies were used as DDoS defenses to mitigate the effects. The two most notable defenses used are the
Styles APA, Harvard, Vancouver, ISO, etc.
2

Zhuang, Rui. "A theory for understanding and quantifying moving target defense." Diss., Kansas State University, 2015. http://hdl.handle.net/2097/20525.

Texte intégral
Résumé :
Doctor of Philosophy<br>Computing and Information Sciences<br>Scott A. DeLoach<br>The static nature of cyber systems gives attackers a valuable and asymmetric advantage - time. To eliminate this asymmetric advantage, a new approach, called Moving Target Defense (MTD) has emerged as a potential solution. MTD system seeks to proactively change system configurations to invalidate the knowledge learned by the attacker and force them to spend more effort locating and re-locating vulnerabilities. While it sounds promising, the approach is so new that there is no standard definition of what an MTD is
Styles APA, Harvard, Vancouver, ISO, etc.
3

Zeitz, Kimberly Ann. "Cybersecurity for the Internet of Things: A Micro Moving Target IPv6 Defense." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/102446.

Texte intégral
Résumé :
As the use of low-power and low-resource embedded devices continues to increase dramatically with the introduction of new Internet of Things (IoT) devices, security techniques are necessary which are compatible with these devices. This research advances the knowledge in the area of cybersecurity for the IoT through the exploration of a moving target defense to apply for limiting the time attackers may conduct reconnaissance on embedded systems while considering the challenges presented from IoT devices such as resource and performance constraints. We introduce the design and optimizations for
Styles APA, Harvard, Vancouver, ISO, etc.
4

Sherburne, Matthew Gilbert. "Micro-Moving Target IPv6 Defense for 6LoWPAN and the Internet of Things." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/52043.

Texte intégral
Résumé :
The Internet of Things (IoT) is composed of billions of sensors and actuators that have varying tasks aimed at making industry, healthcare, and home life more efficient. These sensors and actuators are mainly low-powered and resource-constrained embedded devices with little room for implementing IP security in addition to their main function. With the fact that more of these devices are using IPv6 addressing, we seek to adapt a moving-target defense measure called Moving Target IPv6 Defense for use with embedded devices in order to add an additional layer of security. This adaptation, which we
Styles APA, Harvard, Vancouver, ISO, etc.
5

Hardman, Owen Russell. "Optimizing a Network Layer Moving Target Defense by Translating Software from Python to C." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/64435.

Texte intégral
Résumé :
The security of powerful systems and large networks is often addressed through complex defenses. While these types of defenses offer increased security, they are resource intensive and therefore impractical to implement on many new classes of networked systems, such as mobile phones and small, embedded network infrastructure devices. To provide security for these systems, new defenses must be created that provide highly efficient security. The Moving Target IPv6 Defense (MT6D) is a network layer moving target defense that dynamically changes Internet Protocol version 6 (IPv6) addresses mid-ses
Styles APA, Harvard, Vancouver, ISO, etc.
6

Sagisi, Joseph Lozano. "HE-MT6D: A Network Security Processor with Hardware Engine for Moving Target IPv6 Defense (MT6D) over 1 Gbps IEEE 802.3 Ethernet." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/86789.

Texte intégral
Résumé :
Traditional static network addressing allows attackers the incredible advantage of taking time to plan and execute attacks against a network. To counter, Moving Target IPv6 Defense (MT6D) provides a network host obfuscation technique that dynamically obscures network and transport layer addresses. Software driven implementations have posed many challenges, namely, constant code maintenance to remain compliant with all library and kernel dependencies, less than optimal throughput, and the requirement for a dedicated general purpose hardware. The work of this thesis presents Network Security Pro
Styles APA, Harvard, Vancouver, ISO, etc.
7

Navas, Renzo Efraín. "Improving the resilience of the constrained Internet of Things : a moving target defense approach." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0217.

Texte intégral
Résumé :
Les systèmes de l’Internet des Objets (IoT) sont de plus en plus déployés dans le monde réel, mais leur sécurité est en retard par rapport à l’état de l’art des systèmes non IoT. La Défense par Cible Mouvante (MTD) est un paradigme de cyberdéfense qui propose de randomiser les composants des systèmes, dans l’intention de faire échec aux cyberattaquants qui s’appuyaient auparavant sur la nature statique des systèmes. Les attaquants sont désormais limités par le temps. Le MTD a été mis en œuvre avec succès dans les systèmes conventionnels, mais son utilisation pour améliorer la sécurité des IoT
Styles APA, Harvard, Vancouver, ISO, etc.
8

Basam, Dileep Kumar. "Strengthening MT6D Defenses with Darknet and Honeypot capabilities." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/64375.

Texte intégral
Résumé :
With the ever increasing adoption of IPv6, there has been a growing concern for security and privacy of IPv6 networks. Mechanisms like the Moving Target IPv6 Defense (MT6D) leverage the immense address space available with the new 128-bit addressing scheme to improve security and privacy of IPv6 networks. MT6D allows participating hosts to hop onto new addresses, that are cryptographically computed, without any disruption to ongoing conversations. However, there is no feedback mechanism in the current MT6D implementation to substantiate the core strength of the scheme i.e., to find an attack
Styles APA, Harvard, Vancouver, ISO, etc.
9

Dunlop, Matthew William. "Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses." Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77333.

Texte intégral
Résumé :
Society's increased use of network applications, such as email, social networking, and web browsing, creates a massive amount of information floating around in cyber space. An attacker can collect this information to build a profile of where people go, what their interests are, and even what they are saying to each other. For certain government and corporate entities, the exposure of this information could risk national security or loss of capital. This work identifies vulnerabilities in the way the Internet Protocol version 6 (IPv6) forms addresses. These vulnerabilities provide attackers wit
Styles APA, Harvard, Vancouver, ISO, etc.
10

Bardas, Alexandru Gavril. "Evaluating and quantifying the feasibility and effectiveness of whole IT system moving target defenses." Diss., Kansas State University, 2016. http://hdl.handle.net/2097/32570.

Texte intégral
Résumé :
Doctor of Philosophy<br>Computing and Information Sciences<br>Scott A. DeLoach<br>Xinming (Simon) Ou<br>The Moving Target Defense (MTD) concept has been proposed as an approach to rebalance the security landscape by increasing uncertainty and apparent complexity for attackers, reducing their window of opportunity, and raising the costs of their reconnaissance and attack efforts. Intuitively, the idea of applying MTD techniques to a whole IT system should provide enhanced security; however, little research has been done to show that it is feasible or beneficial to the system’s security. This di
Styles APA, Harvard, Vancouver, ISO, etc.
11

Morrell, Christopher Frank. "Improving the Security, Privacy, and Anonymity of a Client-Server Network through the Application of a Moving Target Defense." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/79791.

Texte intégral
Résumé :
The amount of data that is shared on the Internet is growing at an alarming rate. Current estimates state that approximately 2.5 exabytes of data were generated every day in 2012. This rate is only growing as people continue to increase their on-line presence. As the amount of data grows, so too do the number of people who are attempting to gain access to the data. Attackers try many methods to gain access to information, including a number of attacks that occur at the network layer. A network-based moving target defense is a technique that obfuscates the location of a machine on the Inter
Styles APA, Harvard, Vancouver, ISO, etc.
12

Eldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.

Texte intégral
Résumé :
Cyber-physical systems (CPSs) are systems that integrate physical elements with a cyber layer that enables sensing, monitoring, and processing the data from the physical components. Examples of CPSs include autonomous vehicles, unmanned aerial vehicles (UAVs), smart grids, and the Internet of Things (IoT). In particular, many critical infrastructure (CI) that are vital to our modern day cities and communities, are CPSs. This wide range of CPSs domains represents a cornerstone of smart cities in which various CPSs are connected to provide efficient services. However, this level of connectivity
Styles APA, Harvard, Vancouver, ISO, etc.
13

Torvik, B. "Investigation of non-cooperative target recognition of small and slow moving air targets in modern air defence surveillance radar." Thesis, University College London (University of London), 2016. http://discovery.ucl.ac.uk/1532017/.

Texte intégral
Résumé :
This thesis covers research in the field of non-cooperative target recognition given the limitations of modern air defence surveillance radars. The potential presence of low observable manned or unmanned targets within the vast surveillance volume demand highly sensitive systems. This may again introduce unwanted detections of single birds of comparable radar cross section, previously avoided by use of wide clutter rejection filters and sensitivity time control. The demand for methods effectively separating between birds and slow moving manmade targets is evident. The research questions addres
Styles APA, Harvard, Vancouver, ISO, etc.
14

"Moving Target Defense for Web Applications." Master's thesis, 2018. http://hdl.handle.net/2286/R.I.49042.

Texte intégral
Résumé :
abstract: Web applications continue to remain as the most popular method of interaction for businesses over the Internet. With it's simplicity of use and management, they often function as the "front door" for many companies. As such, they are a critical component of the security ecosystem as vulnerabilities present in these systems could potentially allow malicious users access to sensitive business and personal data. The inherent nature of web applications enables anyone to access them anytime and anywhere, this includes any malicious actors looking to exploit vulnerabilities present in the
Styles APA, Harvard, Vancouver, ISO, etc.
15

Huang, Bo-Sheng, and 黃柏勝. "SDN/NFV Based Moving Target DDoS Defense Mechanism." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/j992av.

Texte intégral
Résumé :
碩士<br>國立中央大學<br>資訊工程學系<br>105<br>With the advancement of technology and popularity of networking devices, network security is facing severe challenges. The rapid development of Internet technology also makes the hacker's attack more mature and diversified. Such as Trojan virus, Denial of Service (DoS) and Distributed Denial of Service (DDoS). One of the most serious security problems is DDoS attack.The Development of Internet technology have made hacker's attack more diversified and can be switched to different DDoS attacks (UDP flooding, ICMP flooding, etc.). If the attacker found that the at
Styles APA, Harvard, Vancouver, ISO, etc.
16

"Moving Target Defense Using Live Migration of Docker Containers." Master's thesis, 2017. http://hdl.handle.net/2286/R.I.45535.

Texte intégral
Résumé :
abstract: Today the information technology systems have addresses, software stacks and other configuration remaining unchanged for a long period of time. This paves way for malicious attacks in the system from unknown vulnerabilities. The attacker can take advantage of this situation and plan their attacks with sufficient time. To protect our system from this threat, Moving Target Defense is required where the attack surface is dynamically changed, making it difficult to strike. In this thesis, I incorporate live migration of Docker container using CRIU (checkpoint restore) for moving target
Styles APA, Harvard, Vancouver, ISO, etc.
17

Huang, Sheng-Hung, and 黃聖閎. "P4 Switch-Based Solution for Moving Target Defense Networks." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/hn728b.

Texte intégral
Résumé :
碩士<br>國立中央大學<br>資訊工程學系<br>106<br>In recent years, novel network architectures and defensive thinking have arisen. Software-defined network (SDN) technology is proposed to decouple the control plane from network devices and implements it in software instead. With the evolution of technology, Programming protocol-independent packet processors(P4) have been proposed, which ensures the data plane can also be defined by software to achieve a true software-defined network. On the other hand, in order to solve the inherent defects of the current network architecture settings, the Moving Target Defens
Styles APA, Harvard, Vancouver, ISO, etc.
18

Chen, Wei-Yu, and 陳韋佑. "Machine Learning-based DDoS Attacks Detection for Moving Target Defense Networks." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/5d68ev.

Texte intégral
Résumé :
碩士<br>國立中央大學<br>資訊工程學系<br>107<br>In recent years, the Internet of Things (IoT) technology has developed rapidly. By 2020, it is expected that more than ten billion IoT devices surf on the Internet. Due to the low processing capabilities of IoT devices, the vulnerabilities of security mechanism cause the rapid growth of IoT-based botnets such as Mirai and Torii. Botnets are often used to implement Distributed Denial-of-Service (DDoS) attacks. The advancement of the Internet technology has made it easy for hackers to control a large of zombie devices and launch DDoS attacks. (TCP Flooding, UDP F
Styles APA, Harvard, Vancouver, ISO, etc.
19

De, Benedictis Alessandra. "Change to survive: a Moving Target Defense approach to secure resource-constrained distributed devices." Tesi di dottorato, 2013. http://www.fedoa.unina.it/9403/1/De%20Benedictis_%20PhD%20Thesis.pdf.

Texte intégral
Résumé :
This doctoral thesis has been developed with the aim of defining a design methodology for monitoring architectures composed of resource-constrained devices (sensor nodes, FPGAs, smartphones...), able to take into account both functional and non-functional requirements. Even if our primary focus was on security, our activity was aimed at identifying a holistic approach able to meet even other quality requirements, such as performance and energy consumption, as they are fundamental in real world applications. Security, performance and energy consumption requirements are closely related to one
Styles APA, Harvard, Vancouver, ISO, etc.
20

"The What, When, and How of Strategic Movement in Adversarial Settings: A Syncretic View of AI and Security." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62910.

Texte intégral
Résumé :
abstract: The field of cyber-defenses has played catch-up in the cat-and-mouse game of finding vulnerabilities followed by the invention of patches to defend against them. With the complexity and scale of modern-day software, it is difficult to ensure that all known vulnerabilities are patched; moreover, the attacker, with reconnaissance on their side, will eventually discover and leverage them. To take away the attacker's inherent advantage of reconnaissance, researchers have proposed the notion of proactive defenses such as Moving Target Defense (MTD) in cyber-security. In this thesis, I mak
Styles APA, Harvard, Vancouver, ISO, etc.
21

"Software-defined Situation-aware Cloud Security." Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62942.

Texte intégral
Résumé :
abstract: The use of reactive security mechanisms in enterprise networks can, at times, provide an asymmetric advantage to the attacker. Similarly, the use of a proactive security mechanism like Moving Target Defense (MTD), if performed without analyzing the effects of security countermeasures, can lead to security policy and service level agreement violations. In this thesis, I explore the research questions 1) how to model attacker-defender interactions for multi-stage attacks? 2) how to efficiently deploy proactive (MTD) security countermeasures in a software-defined environment for single
Styles APA, Harvard, Vancouver, ISO, etc.
22

Chaturvedi, Shilpa. "Efficient and Resilient Stream Processing in Distributed Shared Environment." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/5299.

Texte intégral
Résumé :
Internet of Things (IoT) deployments comprising of sensors and actuators collect observational data and provide continuous streams of data, often called streaming data or fast data. Smart Cities use such IoT technologies for providing effective citizen services, and improve the effi- ciency of the utility infrastructure. Such Smart City applications need to analyze and process these data streams in near real-time to make decisions or provide public services. Distributed Stream Processing Systems (DSPS) like Apache Storm and Spark Streaming are data platforms tailored to handle streaming
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!