Back to Search
Start Over
Defending from Stealthy Botnets Using Moving Target Defenses
- Source :
- IEEE Security & Privacy. 16:92-97
- Publication Year :
- 2018
- Publisher :
- Institute of Electrical and Electronics Engineers (IEEE), 2018.
-
Abstract
- In today’s IT landscape, organizations are increasingly exposed to an array of novel and sophisticated threats—including advanced persistent threats (APTs) and distributed denial-of-service (DDoS) attacks—which can bypass traditional defenses and persist in target systems indefinitely. Threat actors often rely on networks of compromised and remotely controlled hosts, known as botnets, to execute a number of different cyberattacks and engage in criminal or unauthorized activities. Protecting sensitive and mission-critical data from competitors, state actors, and organized crime has become increasingly critical for the well-being of many organizations. A promising approach to botnet detection and mitigation relies on moving target defense (MTD), a novel and game-changing approach to cyber defense. MTD creates asymmetric uncertainty, providing the defender with a tactical advantage over the attacker. MTD techniques are designed to continuously change or shift a system’s attack surface, thus increasing cost and complexity for the threat actors. We show how the botnet detection and mitigation problem can be decomposed in three related and relatively simpler challenges, and how these challenges can be effectively tackled adopting an MTD approach, ultimately limiting the ability of a botnet to persist within a target system.
- Subjects :
- 021110 strategic, defence & security studies
Advanced persistent threat
Computer Networks and Communications
Network security
business.industry
Computer science
0211 other engineering and technologies
Botnet
020206 networking & telecommunications
Denial-of-service attack
02 engineering and technology
Attack surface
Computer security
computer.software_genre
0202 electrical engineering, electronic engineering, information engineering
Data Protection Act 1998
Organised crime
Electrical and Electronic Engineering
business
Resilience (network)
Law
computer
Subjects
Details
- ISSN :
- 15584046 and 15407993
- Volume :
- 16
- Database :
- OpenAIRE
- Journal :
- IEEE Security & Privacy
- Accession number :
- edsair.doi...........c0a8f1b16289cdf222e31212efbbaeac
- Full Text :
- https://doi.org/10.1109/msp.2018.1331034