SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 강기완 | - |
dc.contributor.author | 서정택 | - |
dc.contributor.author | Baek, Sung Hoon | - |
dc.contributor.author | Kim, Chul Woo | - |
dc.contributor.author | 박기웅 | - |
dc.date.accessioned | 2022-04-19T01:40:19Z | - |
dc.date.available | 2022-04-19T01:40:19Z | - |
dc.date.created | 2022-04-18 | - |
dc.date.issued | 2022-03 | - |
dc.identifier.issn | 1976-7277 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/84026 | - |
dc.description.abstract | In recent years, container techniques have been broadly applied to cloud computing systems to maximize their efficiency, flexibility, and economic feasibility. Concurrently, studies have also been conducted to ensure the security of cloud computing. Among these studies, moving-target defense techniques using the high agility and flexibility of cloud-computing systems are gaining attention. Moving-target defense (MTD) is a technique that prevents various security threats in advance by proactively changing the main attributes of the protected target to confuse the attacker. However, an analysis of existing MTD techniques revealed that, although they are capable of deceiving attackers, MTD techniques have practical limitations when applied to an actual cloud-computing system. These limitations include resource wastage, management complexity caused by additional function implementation and system introduction, and a potential increase in attack complexity. Accordingly, this paper proposes a software-defined MTD system that can flexibly apply and manage existing and future MTD techniques. The proposed software-defined MTD system is designed to correctly define a valid mutation range and cycle for each moving-target technique and monitor system-resource status in a software-defined manner. Consequently, the proposed method can flexibly reflect the requirements of each MTD technique without any additional hardware by using a software-defined approach. Moreover, the increased attack complexity can be resolved by applying multiple MTD techniques. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | 한국인터넷정보학회 | - |
dc.relation.isPartOf | KSII Transactions on Internet and Information Systems | - |
dc.title | SD-MTD: Software-Defined Moving-Target Defense for Cloud-System Obfuscation | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000787868200017 | - |
dc.identifier.doi | 10.3837/tiis.2022.03.017 | - |
dc.identifier.bibliographicCitation | KSII Transactions on Internet and Information Systems, v.16, no.3, pp.1063 - 1075 | - |
dc.identifier.kciid | ART002828140 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-85127897545 | - |
dc.citation.endPage | 1075 | - |
dc.citation.startPage | 1063 | - |
dc.citation.title | KSII Transactions on Internet and Information Systems | - |
dc.citation.volume | 16 | - |
dc.citation.number | 3 | - |
dc.contributor.affiliatedAuthor | 서정택 | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Cloud Computing System | - |
dc.subject.keywordAuthor | Container Orchestration | - |
dc.subject.keywordAuthor | Moving-Target Defense | - |
dc.subject.keywordAuthor | System Obfuscation | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.description.journalRegisteredClass | kci | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.