Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud

被引:20
作者
Alavizadeh, Hooman [1 ]
Hong, Jin B. [2 ]
Kim, Dong Seong [3 ]
Jang-Jaccard, Julian [1 ]
机构
[1] Massey Univ, Sch Nat & Computat Sci, Auckland, New Zealand
[2] Univ Western Australia, Comp Sci & Software Engn Dept, Nedlands, WA, Australia
[3] Univ Queensland, Sch Informat Technol & Elect Engn, Brisbane, Qld, Australia
关键词
Security analysis; Graphical security models; Moving target defense; Cloud computing; Security metrics; MOVING-TARGET; SECURITY ANALYSIS; ATTACK; DIVERSITY; EFFICIENT; SERVICES; INTERNET;
D O I
10.1016/j.cose.2020.102091
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Moving Target Defense (MTD) is a defensive strategy to thwart adversaries by continuously shifting the attack surface. The MTD techniques can be applied to the cloud computing to make the cloud more unpredictable, hence more difficult to exploit. There are many MTD techniques proposed, and various metrics are used to measure their effectiveness. However, it is difficult to assess when MTD techniques are used in combinations. In this paper, we propose a formal security assessment approach to evaluate the effectiveness of combined MTD techniques using security modeling. We use security metrics, such as System Risk and Reliability , to evaluate those MTD techniques. In particular, we investigate how the security of the cloud change when two categories of MTD techniques, Shuffle and Redundancy , are used in combinations. We also explore approaches to find important components in the cloud using Network Centrality Measures and the size of the cloud and evaluate the trade-off between security and dependability in terms of the system Risk and Reliability , respectively. We show that combining the shuffle and redundancy MTD techniques could enhance the security of the cloud with the trade-off between the Risk and Reliability , which can be managed using the proposed security assessment approach. (c) 2020 Elsevier Ltd. All rights reserved.
引用
收藏
页数:18
相关论文
共 57 条
[1]  
Adili Mohammad Taghi, 2017, 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), P98, DOI 10.23919/INM.2017.7987269
[2]  
Aikat J., 2017, IEEE Security Privacy, P1
[3]  
Alavizadeh H, 2018 17 IEEE INT C T
[4]  
Alavizadeh H., 2019, PROC INT C INF SECUR, P150
[5]   Effective Security Analysis for Combinations of MTD Techniques on Cloud Computing (Short Paper) [J].
Alavizadeh, Hooman ;
Kim, Dong Seong ;
Hong, Jin B. ;
Jang-Jaccard, Julian .
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 :539-548
[6]   Comprehensive Security Assessment of Combined MTD Techniques for the Cloud [J].
Alavizadeh, Hooman ;
Hong, Jin B. ;
Jang-Jaccard, Julian ;
Kim, Dong Seong .
PROCEEDINGS OF THE 5TH ACM WORKSHOP ON MOVING TARGET DEFENSE (MTD'18), 2018, :11-20
[7]  
[Anonymous], ARXIV190401758
[8]  
[Anonymous], 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, DOI DOI 10.1109/WOWMOM.2014.6918979
[9]  
[Anonymous], COMPUTERS SECURITY
[10]   Defending against hitlist worms using network address space randomization [J].
Antonatos, S. ;
Akritidis, P. ;
Markatos, E. P. ;
Anagnostakis, K. G. .
COMPUTER NETWORKS, 2007, 51 (12) :3471-3490