Implementing a "moving target" system to protect servers

Curtis Taylor, Craug Shue

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. Current methods to prevent such automated attacks are limited in that they are application-specific or fail to block attackers. While attackers have a low success rate, they compensate for it in volume. In order to have high throughput, attackers take shortcuts and break protocols. We address these issues by implementing a system that can detect malicious activity and block attacks. This system was then tested on a network, and we found that not only is this system conceivable, it is effective and has low overhead.

Original languageEnglish
Title of host publication7th Annual Cyber Security and Information Intelligence Research Workshop
Subtitle of host publicationEnergy Infrastructure Cyber Protection, CSIIRW11
DOIs
StatePublished - 2011
Externally publishedYes
Event7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11 - Oak Ridge, TN, United States
Duration: Oct 12 2011Oct 14 2011

Publication series

NameACM International Conference Proceeding Series

Conference

Conference7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11
Country/TerritoryUnited States
CityOak Ridge, TN
Period10/12/1110/14/11

Keywords

  • DNS
  • Network
  • Security

Fingerprint

Dive into the research topics of 'Implementing a "moving target" system to protect servers'. Together they form a unique fingerprint.

Cite this