Visible to the public Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing

TitleEvaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud Computing
Publication TypeConference Paper
Year of Publication2018
AuthorsAlavizadeh, H., Jang-Jaccard, J., Kim, D. S.
Conference Name2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)
Date Publishedaug
ISBN Number978-1-5386-4388-4
Keywordsbig data security, cloud computing, cloud security-related problems, Correlation, diversity reception, graphical security model, Mathematical model, Measurement, Metrics, Moving Target Defence, moving target defense, Moving Target Defense strategy, pubcrawl, resilience, Resiliency, Scalability, security, security analysis, security analysis complexity, security metrics, security metrics system risk, security of data, Servers, Shuffle and Diversity MTD techniques

Moving Target Defence (MTD) has been recently proposed and is an emerging proactive approach which provides an asynchronous defensive strategies. Unlike traditional security solutions that focused on removing vulnerabilities, MTD makes a system dynamic and unpredictable by continuously changing attack surface to confuse attackers. MTD can be utilized in cloud computing to address the cloud's security-related problems. There are many literature proposing MTD methods in various contexts, but it still lacks approaches to evaluate the effectiveness of proposed MTD method. In this paper, we proposed a combination of Shuffle and Diversity MTD techniques and investigate on the effects of deploying these techniques from two perspectives lying on two groups of security metrics (i) system risk: which is the cloud providers' perspective and (ii) attack cost and return on attack: which are attacker's point of view. Moreover, we utilize a scalable Graphical Security Model (GSM) to enhance the security analysis complexity. Finally, we show that combining MTD techniques can improve both aforementioned two groups of security metrics while individual technique cannot.

Citation Keyalavizadeh_evaluation_2018