Moving Target Defense II: Application of Game Theory and Adversarial Modeling [1 ed.] 1461454158, 9781461454151

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Ad

127 45 6MB

English Pages 204 [210] Year 2013

Report DMCA / Copyright

DOWNLOAD PDF FILE

Table of contents :
Front Matter....Pages i-xii
Game Theoretic Approaches to Attack Surface Shifting....Pages 1-13
Security Games Applied to Real-World: Research Contributions and Challenges....Pages 15-39
Adversarial Dynamics: The Conficker Case Study....Pages 41-71
From Individual Decisions from Experience to Behavioral Game Theory: Lessons for Cybersecurity....Pages 73-86
Cyber Maneuver Against External Adversaries and Compromised Nodes....Pages 87-96
Applying Self-Shielding Dynamics to the Network Architecture....Pages 97-115
Moving Target Defenses in the Helix Self-Regenerative Architecture....Pages 117-149
Diversifying the Software Stack Using Randomized NOP Insertion....Pages 151-173
Practical Software Diversification Using In-Place Code Randomization....Pages 175-202
Back Matter....Pages 203-203

Moving Target Defense II: Application of Game Theory and Adversarial Modeling [1 ed.]
 1461454158, 9781461454151

  • 0 0 0
  • Like this paper and download? You can publish your own PDF file online for free in a few minutes! Sign Up