Moving Target Defense for Distributed Systems

This book provides an overview of Moving Target Defense (MTD) and the importance of developing novel MTD schemes to protect distributed systems. It presents MTD-based research efforts to protect cloud data centers, along with network and security risk-awa

  • PDF / 2,308,606 Bytes
  • 92 Pages / 439.43 x 683.15 pts Page_size
  • 62 Downloads / 211 Views

DOWNLOAD

REPORT


Sachin Shetty Xuebiao Yuchi Min Song

Moving Target Defense for Distributed Systems

Wireless Networks Series Editor Xuemin Sherman Shen University of Waterloo Waterloo, Ontario, Canada

More information about this series at http://www.springer.com/series/14180

Sachin Shetty • Xuebiao Yuchi • Min Song

Moving Target Defense for Distributed Systems

123

Sachin Shetty Department of Electrical and Computer Engineering Tennessee State University Nashville, TN, USA

Xuebiao Yuchi China Internet Network Information Center Chinese Academy of Science Beijing, China

Min Song Department of Computer Science Michigan Technological University Houghton, MI, USA

ISSN 2366-1186 ISSN 2366-1445 (electronic) Wireless Networks ISBN 978-3-319-31031-2 ISBN 978-3-319-31032-9 (eBook) DOI 10.1007/978-3-319-31032-9 Library of Congress Control Number: 2016933670 © Springer International Publishing Switzerland 2016 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG Switzerland

To our families

Preface

Distributed Systems are complex systems, and cyber attacks targeting these systems have devastating consequences. Several cybersecurity solutions have failed to protect distributed systems primarily due to asymmetric warfare with cyber adversaries. Most cybersecurity solutions have to grapple with the tradeoff between detecting one breach vs. blocking all possible breaches. Current cyber threats are sophisticated and comprised of multiple attack vectors caused by organized attackers. Most of the current cyber defenses are blackbox or set-and-forget approaches which can protect against zero-day attacks and are ineffective against dynamic threats. The asymmetric conundrum is to determine which assets (software, embedded devices, routers, back-end infrastructure, dependencies between software components) need to be protected. Recently, Moving Target Defense (