[1] 蔡桂林,王宝生,王天佐,等.移动目标防御技术研究进展[J].计算机研究与发展,2016,53(5):968-987. CAI Gui-lin,WANG Bao-sheng,WANG Tian-zuo,et al.Research and development of moving target defense technology[J].Journal of Computer Research and Development,2016,53(5):968-987.(in Chinese)
[2] 邬江兴.拟态计算与拟态安全防御的原意和愿景[J].电信科学,2014,30(7):1-7. WU Jiang-xing.Meaning and vision of mimic computing and mimic security defense[J].Telecommunications Science,2014,30(7):1-7.(in Chinese)
[3] ESKRIDGE T C,CARVALHO M M,STONER E,et al.VINE-A cyber emulation environment for MTD experimentation[A].George C.Proceedings of the Second ACM Workshop on Moving Target Defense[C].Denver,Colorado,USA:ACM,2015.43-47.
[4] ZAFFARANO K,TAYLOR J,HAMILTON S.A quantitative framework for moving target defense effectiveness evaluation[A].George C.Proceedings of the Second ACM Workshop on Moving Target Defense[C].Denver,Colorado,USA:ACM,2015.3-10.
[5] OKHRAVI H,RIORDAN J,CARTER K.Quantitative evaluation of dynamic platform techniques as a defensive mechanism[A].Research in Attacks,Intrusions and Defenses[C].New York:Springer,2014.405-425.
[6] ZHUANG R,DELOACH S A,OU X.A model for analyzing the effect of moving target defenses on enterprise networks[A].Robert K A.Cyber and Information Security Research Conference[C].Oak Ridge,TN,USA:ACM,2014.73-76.
[7] 雷程,马多贺,张红旗,等.基于变点检测的网络移动目标防御效能评估方法[J].通信学报,2017,38(1):126-140. LEI Cheng,MA Duo-he,ZHANG Hong-qi,et,al.Performance assessment approach based on change-point detection for network moving target defense[J].Journal on Communications,2017,38(1):126-140.(in Chinese)
[8] HAMLET J R,LAMB C C.Dependency graph analysis and moving target defense selection[A].Peng Liu.Proceedings of the 2016 ACM Workshop on Moving Target Defense[C].Vienna,Austria:ACM,2016.105-116.
[9] CARTER K M,RIORDAN J F,OKHRAVI H.A game theoretic approach to strategy determination for dynamic platform defenses[A].Sushil J.Proceedings of the First ACM Workshop on Moving Target Defense[C].Scottsdale,Arizona,USA:ACM,2014.21-30.
[10] HODA M,SAEED V,WILLIAM K,et al.Markov modeling of moving target defense games[A].Peng Liu.Proceedings of the 2016 ACM Workshop on Moving Target Defense[C].Vienna,Austria:ACM,2016.81-92.
[11] MASON W,SRIDHAR V,MASSIMILIANO A,et al.Moving target defense against DDoS attacks:an empirical game-theoretic analysis[A].Peng Liu.Proceedings of the 2016 ACM Workshop on Moving Target Defense[C].Vienna,Austria:ACM,2016.93-104.
[12] CARROLL T E,CROUSE M,FULP E W,et al.Analysis of network address shuffling as a moving target defense[A].Abbas J.IEEE International Conference on Communications[C].Sydney,Australia:IEEE,2014.701-706.
[13] LUO Y B,WANG B S,CAI G L.Effectiveness of port hopping as a moving target defense[A].Yong-ik Y.International Conference on Security Technology[C].Hainan,China:IEEE,2014.7-10.
[14] 程叶霞,姜文,薛质,等.基于攻击图模型的多目标网络安全评估研究[J].计算机研究与发展,2012,49:23-31. CHENG Ye-xia,JIANG Wen,XUE Zhi,et al.Multi-objective network security evaluation based on attack graph model[J].Journal of Computer Research and Development,2012,49:23-31.(in Chinese)
[15] SUSHIL J,ANUP K G,VIPIN S,et al.Moving Target Defense-Creating Asymmetric Uncertainty for Cyber Threats[M] New York:Springer,2011.117-151.
[16] 陈锋,张怡,苏金树,等.攻击图的两种形式化分析[J].软件学报,2010,21(4):838-848. CHEN Feng,ZHANG Yi,SU Jin-shu,et all.Two formal analyses of attack graphs[J].Journal of Software,2010,21(4):838-848.(in Chinese) |