Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Securing Forwarding Layers from Eavesdropping Attacks Using Proactive Approaches

    Jiajun Yan, Ying Zhou*, Anchen Dai, Tao Wang

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 563-580, 2024, DOI:10.32604/cmc.2024.048922 - 25 April 2024

    Abstract As an emerging network paradigm, the software-defined network (SDN) finds extensive application in areas such as smart grids, the Internet of Things (IoT), and edge computing. The forwarding layer in software-defined networks is susceptible to eavesdropping attacks. Route hopping is a moving target defense (MTD) technology that is frequently employed to resist eavesdropping attacks. In the traditional route hopping technology, both request and reply packets use the same hopping path. If an eavesdropping attacker monitors the nodes along this path, the risk of 100% data leakage becomes substantial. In this paper, we present an effective… More >

  • Open Access

    ARTICLE

    MF2-DMTD: A Formalism and Game-Based Reasoning Framework for Optimized Drone-Type Moving Target Defense

    Sang Seo1, Jaeyeon Lee2, Byeongjin Kim2, Woojin Lee2, Dohoon Kim3,*

    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 2595-2628, 2023, DOI:10.32604/cmc.2023.042668 - 29 November 2023

    Abstract Moving-target-defense (MTD) fundamentally avoids an illegal initial compromise by asymmetrically increasing the uncertainty as the attack surface of the observable defender changes depending on spatial-temporal mutations. However, the existing naive MTD studies were conducted focusing only on wired network mutations. And these cases have also been no formal research on wireless aircraft domains with attributes that are extremely unfavorable to embedded system operations, such as hostility, mobility, and dependency. Therefore, to solve these conceptual limitations, this study proposes normalized drone-type MTD that maximizes defender superiority by mutating the unique fingerprints of wireless drones and that… More >

  • Open Access

    ARTICLE

    Strategy Selection for Moving Target Defense in Incomplete Information Game

    Huan Zhang1, Kangfeng Zheng1, *, Xiujuan Wang2, Shoushan Luo1, Bin Wu1

    CMC-Computers, Materials & Continua, Vol.62, No.2, pp. 763-786, 2020, DOI:10.32604/cmc.2020.06553

    Abstract As a core component of the network, web applications have become one of the preferred targets for attackers because the static configuration of web applications simplifies the exploitation of vulnerabilities by attackers. Although the moving target defense (MTD) has been proposed to increase the attack difficulty for the attackers, there is no solo approach can cope with different attacks; in addition, it is impossible to implement all these approaches simultaneously due to the resource limitation. Thus, the selection of an optimal defense strategy based on MTD has become the focus of research. In general, the… More >

Displaying 1-10 on page 1 of 3. Per Page