{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,3,30]],"date-time":"2024-03-30T01:13:31Z","timestamp":1711761211158},"posted":{"date-parts":[[2024]]},"group-title":"SSRN","reference-count":47,"publisher":"Elsevier BV","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.2139\/ssrn.4777777","type":"posted-content","created":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T07:18:24Z","timestamp":1711696704000},"source":"Crossref","is-referenced-by-count":0,"title":["Evaluation of Time-Based Virtual Machine Migration as Moving Target Defense Against Host-Based Attacks"],"prefix":"10.2139","author":[{"given":"Matheus  D&apos;E\u00e7a","family":"Torquato","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Maciel","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Vieira","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"ref1","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/SURV.2009.090208","article-title":"A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability","volume":"11","author":"Mohamed Al-Kuwaiti","year":"2009","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1016\/j.future.2021.09.005","article-title":"A formal analysis of performance-security tradeoffs under frequent task reconfigurations","volume":"127","author":"Sarah Alhozaimy","year":"2022","journal-title":"Future Generation Computer Systems"},{"issue":"1","key":"ref3","first-page":"1","article-title":"Decision making in cloud environments: an approach based on multiple-criteria decision analysis and stochastic models","volume":"7","author":"Julian Araujo","year":"2018","journal-title":"Journal of Cloud Computing"},{"issue":"5","key":"ref4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3241737","article-title":"A manifesto for future generation cloud computing: Research directions for the next decade","volume":"51","author":"Rajkumar Buyya","year":"2018","journal-title":"ACM computing surveys (CSUR)"},{"key":"ref5","first-page":"59","article-title":"Scikitcriteria: Colecci\ufffdn de m\ufffdtodos de an\ufffdlisis multi-criterio integrado al stack cient\ufffdfico de Python","author":"Nadia Ayelen Juan B Cabral","year":"2016","journal-title":"XLV Jornadas Argentinas de Inform\ufffdtica e Investigaci\ufffdn Operativa (45JAIIO)-XIV Simposio Argentino de Investigaci\ufffdn Operativa (SIO)"},{"key":"ref6","first-page":"184","article-title":"A model for evaluating and comparing moving target defense techniques based on generalized stochastic petri net","author":"Guilin Cai","year":"2016","journal-title":"Conference on Advanced Computer Architecture"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"11437","DOI":"10.1109\/ACCESS.2020.2965090","article-title":"Numerical evaluation of job finish time under mtd environment","volume":"8","author":"Zhi Chen","year":"2020","journal-title":"IEEE Access"},{"key":"ref8","first-page":"1","article-title":"Model-based performance evaluation of a moving target defense system","author":"Zhi Chen","year":"2020","journal-title":"GLOBECOM 2020-2020 IEEE Global Communications Conference"},{"key":"ref9","first-page":"142","article-title":"Spnp: Stochastic petri net package","volume":"89","author":"Gianfranco Ciardo","year":"1989","journal-title":"PNPM"},{"key":"ref10","first-page":"273","article-title":"Live migration of virtual machines","volume":"2","author":"Christopher Clark","year":"2005","journal-title":"Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation"},{"key":"ref11","first-page":"1988","article-title":"Assessing dependability of web services under moving target defense techniques","author":"Salvatore Distefano","year":"2020","journal-title":"Proceedings of the 30th European Safety and Reliability Conference (ESREL2020) and the 15th Probabilistic Safety Assessment and Management Conference (PSAM15)"},{"key":"ref12","article-title":"An integrated security hardening optimization for dynamic networks using security and availability modeling with multi-objective algorithm","volume":"208","author":"Simon Yusuf","year":"2022","journal-title":"Computer Networks"},{"key":"ref13","article-title":"A practical framework for cyber defense generation, enforcement and evaluation","volume":"208","author":"Simon Yusuf","year":"2022","journal-title":"Computer Networks"},{"key":"ref14","volume":"21","author":"Tomas Gal","year":"2013","journal-title":"Multicriteria decision making: advances in MCDM models, algorithms, theory, and applications"},{"issue":"6","key":"ref15","first-page":"47","article-title":"Priority effect on pointwise availability of the system. Revue fran\ufffdaise d'automatique, informatique, recherche op\ufffdrationnelle","author":"Ak Govil","year":"1972","journal-title":"Recherche op\ufffdrationnelle"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/ARMS.1991.154425","article-title":"Dependability modeling for computer systems","author":"Nitin David I Heimann","year":"1991","journal-title":"Annual Reliability and Maintainability Symposium. 1991 Proceedings"},{"issue":"2","key":"ref17","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/TDSC.2015.2443790","article-title":"Assessing the effectiveness of moving target defenses using security models","volume":"13","author":"Jin B Hong","year":"2015","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref18","first-page":"1","article-title":"Impact of memory dos attacks on cloud applications and real-time detection schemes","author":"Zhuozhao Li","year":"2020","journal-title":"49th International Conference on Parallel Processing-ICPP"},{"issue":"1","key":"ref19","article-title":"Survivability quantification: The analytical modeling approach","volume":"2","author":"Yun Liu","year":"2006","journal-title":"International Journal of Performability Engineering"},{"key":"ref20","author":"Paulo Romero","year":"2023","journal-title":"Performance, reliability, and availability evaluation of computational systems, volume I: performance and background"},{"issue":"2","key":"ref21","article-title":"Modelling with generalized stochastic petri nets","volume":"26","author":"Gianfranco Ajmone Marsan","year":"1998","journal-title":"ACM SIGMETRICS performance evaluation review"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1180","DOI":"10.1145\/3341105.3374016","article-title":"Performability analysis of services in a software-defined networking adopting time-based moving target defense mechanisms","author":"J\ufffdlio Mendon\ufffda","year":"2020","journal-title":"Proceedings of the 35th Annual ACM Symposium on Applied Computing"},{"issue":"3","key":"ref23","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/306225.306235","article-title":"httperf-a tool for measuring web server performance","volume":"26","author":"David Mosberger","year":"1998","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"issue":"1","key":"ref24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3287306","article-title":"An exhaustive survey on security concerns and solutions at different components of virtualization","volume":"52","author":"Rajendra Patil","year":"2019","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"ref25","first-page":"100","article-title":"Downtime analysis of virtual machine live migration","author":"Felix Salfner","year":"2011","journal-title":"The Fourth International Conference on Dependability (DEPEND 2011)"},{"key":"ref26","volume":"25","author":"Stefan Scherfke","year":"2020","journal-title":"Discrete Event Simulation for Python"},{"key":"ref27","author":"Sailik Sengupta","year":"2020","journal-title":"A survey of moving target defenses for network security"},{"issue":"7","key":"ref28","article-title":"Modeling and performance analysis of satellite network moving target defense system with petri nets","volume":"13","author":"Leyi Shi","year":"2021","journal-title":"Remote Sensing"},{"key":"ref29","first-page":"356","volume":"54","author":"John W Shipman","year":"2013","journal-title":"Tkinter 8.5 reference: a gui for python"},{"key":"ref30","first-page":"1","article-title":"Mercury: An integrated environment for performance and dependability evaluation of general systems","author":"Bruno Silva","year":"2015","journal-title":"Proceedings of industrial track at 45th dependable systems and networks conference, DSN"},{"issue":"5","key":"ref31","doi-asserted-by":"crossref","first-page":"15","DOI":"10.9790\/3021-04521525","article-title":"Major mcdm techniques and their application-a review","volume":"4","author":"Aarushi Singh","year":"2014","journal-title":"IOSR Journal of Engineering"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/EDCC.2019.00029","article-title":"A hierarchical model for virtualized data center availability evaluation","author":"Matheus Torquato","year":"2019","journal-title":"2019 15th European Dependable Computing Conference (EDCC)"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/PRDC50213.2020.00016","article-title":"Security and availability modeling of vm migration as moving target defense","author":"Matheus Torquato","year":"2020","journal-title":"2020 IEEE 25th Pacific Rim International Symposium on Dependable Computing (PRDC)"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1145\/3412841.3441899","article-title":"Analysis of vm migration scheduling as moving target defense against insider attacks","author":"Matheus Torquato","year":"2021","journal-title":"Proceedings of the 36th Annual ACM Symposium on Applied Computing"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1109\/ISSRE52982.2021.00045","article-title":"Pymtdevaluator: A tool for time-based moving target defense evaluation: Tool description paper","author":"Matheus Torquato","year":"2021","journal-title":"2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE)"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1109\/ISSRE55969.2022.00029","article-title":"Software rejuvenation meets moving target defense: Modeling of time-based virtual machine migration approach","author":"Matheus Torquato","year":"2022","journal-title":"2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE)"},{"key":"ref37","article-title":"Moving target defense in cloud computing: A systematic mapping study","volume":"92","author":"Matheus Torquato","year":"2020","journal-title":"Computers & Security"},{"key":"ref38","first-page":"1","article-title":"Vm migration scheduling as moving target defense against memory dos attacks: An empirical study","author":"Matheus Torquato","year":"2021","journal-title":"2021 IEEE Symposium on Computers and Communications (ISCC)"},{"key":"ref39","author":"Sandro Tosi","year":"2009","journal-title":"Matplotlib for Python developers"},{"key":"ref40","author":"Evangelos Triantaphyllou","year":"2000","journal-title":"Multicriteria decision making methods"},{"key":"ref41","author":"S Kishor","year":"2017","journal-title":"Reliability and availability engineering: modeling, analysis, and applications"},{"key":"ref42","first-page":"223","article-title":"Teastore: A micro-service reference application for benchmarking, modeling and resource management research","author":"Von Joakim","year":"2018","journal-title":"2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"4995","DOI":"10.1109\/GLOBECOM54140.2023.10437647","article-title":"An srn-based model for assessing co-resident attack mitigation in cloud with vm migration and allocation policies","author":"Xin Yang","year":"2023","journal-title":"GLOBECOM 2023-2023 IEEE Global Communications Conference"},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1145\/3092627.3092630","article-title":"Host-based dos attacks and defense in the cloud","author":"Tianwei Zhang","year":"2017","journal-title":"Proceedings of the Hardware and Architectural Support for Security and Privacy, HASP '17"},{"key":"ref45","first-page":"253","article-title":"Dos attacks on your memory in cloud","author":"Tianwei Zhang","year":"2017","journal-title":"Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/978-3-319-66335-7_19","article-title":"Modelling and performance evaluation with timenet 4.4","author":"Armin Zimmermann","year":"2017","journal-title":"International conference on quantitative evaluation of systems"},{"key":"ref47","article-title":"His current research focuses on designing analytical models to evaluate the performance, dependability, and security of moving target defense deployments in cloud computing. He received his Master's Degree in Computer Science from the Federal University of Pernambuco. He is Assistant Professor at the Federal Institute of Alagoas, Campus Arapiraca","journal-title":"His research interests include Cloud Computing, Performance, Dependability, and Security Modeling"}],"container-title":[],"original-title":[],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T15:35:21Z","timestamp":1711726521000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.ssrn.com\/abstract=4777777"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":47,"URL":"https:\/\/doi.org\/10.2139\/ssrn.4777777","relation":{},"subject":[],"published":{"date-parts":[[2024]]},"subtype":"preprint"}}