[1] Yadav,Tarun,and R A Mallari.Technical aspects of cyber kill chain[A].Third International Symposium on Security in Computing and Communications[C].London:Springer International Publishing,2015.438-452.
[2] Cai G,Wang B,Wei H U,et al.Moving target defense:state of the art and characteristics[J].Journal of Zhejiang University Science C,2016,17(11):1122-1153.
[3] Célestin Matte,Cunche M,Rousseau F,et al.Defeating MAC address randomization through timing attacks[A].Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks[C].Darmstadt:ACM,2016.15-20.
[4] Achleitner S,et al.Cyber deception:virtual networks to defend insider reconnaissance[A].Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats[C].Vienna:ACM,2016.57-68.
[5] Stafford S,Li J.Behavior-based worm detectors compared[A].International Workshop on Recent Advances in Intrusion Detection[C].Berlin:Springer,2010.38-57.
[6] Kai W,Xi C,Zhu Y.Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks[J].Plos One,2017,12(5):e0177111.
[7] 陈扬,扈红超,等.软件定义的内网动态防御系统设计与实现[J].电子学报,2018,46(11):2604-2611. CHEN Y,HU H,et al.The design and implementation of a software-defined intranet dynamic defense system[J].Acta Electronica Sinica,2018,46(11):2604-2611.(in Chinese)
[8] Badishi G,Herzberg A,Keidar I.Keeping denial-of-service attackers in the dark[J].IEEE Transactions on Dependable & Secure Computing,2007,4(3):191-204.
[9] Duan Q,Al-Shaer E,Jafarian H. Efficient random route mutation considering flow and network constraints[A].IEEE Conference on Communications and Network Security[C].Washington:IEEE,2013.260-268..
[10] Kewley D,Fink R,Lowry J,et al.Dynamic approaches to thwart adversary intelligence gathering[A].DARPA Information Survivability Conference & Exposition Ⅱ[C].Piscataway:IEEE,2001.176-185.
[11] Antonatos S,Akritidis P,Markatos E P,et al.Defending against hitlist worms using network address space randomization[J].Computer Networks,2007,51(12):3471-3490.
[12] Dunlop M,Groat S,Urbanski W,et al.MT6D:A moving target IPv6 defense[A].Military Communications Conference[C].Baltimore:IEEE,2011.1321-1326.
[13] Jafarian J H,Al-Shaer E,Duan Q.An effective address mutation approach for disrupting reconnaissance attacks[J].IEEE Transactions on Information Forensics and Security,2015,10(12):2562-2577.
[14] Kreutz D,Ramos F M V,Esteves Verissimo P,et al.Software-defined networking:a comprehensive survey[J].Proceedings of the IEEE,2015,103(1):14-76.
[15] Jafarian J H,Al-Shaer E,Duan Q.Openflow random host mutation:transparent moving target defense using software defined networking[A].Workshop on Hot Topics in Software Defined Networks[C].Helsinki:ACM,2012.127-132.
[16] Carter K M,Riordan J F,Okhravi H.Agame theoretic approach to strategy determination for dynamic platform defenses[A].Proceedings of the First ACM Workshop on Moving Target Defense[C].Scottsdale:ACM,2014.21-30.
[17] Schlenker A,Thakoor O,Xu H,et al.Deceiving cyber adversaries:a game theoretic approach[A].Proceedings of the 17th International Conference on Autonomous Agents and Multi-agent Systems (AAMAS)[C].Stockholm:Springer,2018.892-900.
[18] Clark A,Sun K,Bushnell L,et al.A game-theoretic approach to IP address randomization in decoy-cased cyber defense[A].International Conference on Decision and Game Theory for Security[C].London:Springer International Publishing,2015.3-21. |