[1] Jin C,Hao Z Y,Wu Z G.Principles and defense strategies of DNS cache poisoning[J].China Communications,2009,6(4):17-22.
[2] Bassil R,Hobeica R.Security analysis and solution for thwarting cache poisoning attacks in the domain name system[A].Proceedings of the 19th International Conference on Telecommunications[C].Piscataway,USA:IEEE,2012.1-6.
[3] Herzberg A,Shulmanz H.Fragmentation considered poisonous,or:one-domain-to-rule-them-all.org[A].Proceedings of IEEE Conference on Communications and Network Security[C].Washington,USA:IEEE,2013.224-232.
[4] Gilad Y,Herzberg A.Fragmentation considered vulnerable[J].ACM Trans on Information and System Security,2013,15(4):1-31.
[5] Van Rijswijkdeij R,Sperotto A,Pras A.DNSSEC and its potential for DDoS attacks[A].Proceedings of the Internet Measurement Conference[C].New York,USA:ACM/USENIX,2014.449-460.
[6] Wu H,Dang X L,Zhang L,et al.Kalman Filter based DNS cache poisoning attack detection[A].Proceedings of IEEE International Conference on Automation Science and Engineering[C].Piscataway,USA:IEEE,2015.1594-1600.
[7] Wu H,Dang X L,Wang L.D,et al.Information fusion-based method for distributed domain name system cache poisoning attack detection and identification[J].Institution of Engineering and Technology Information Security,2016,10(1):37-44.
[8] 王秀利,王永吉.基于命令紧密度的用户伪装入侵检测方法[J].电子学报,2014,42(6):1225-1229. WANG Xiuli,WANG Yongji.Masquerader detection based on command closeness model[J].Acta Electronica Sinica,2014,42(6):1225-1229.(in Chinese)
[9] Perdisci R,Antonakakis M,Luo X P,et al.WSEC DNS:protecting recursive DNS resolvers from poisoning attacks[A].International Conference on Dependable Systems and Networks[C].Piscataway,USA:IEEE,2009.3-12.
[10] Dagon D,Antonakakis M,Vixie P,et al.Increased DNS forgery resistance through 0x20-bit encoding[A].Proceedings of ACM Conference on Computer and Communications Security[C].Alexandria,USA:ACM,2008.211-222.
[11] Yuan L H,Kant K,Mohapatra P,et al.DoX:a Peer-to-Peer antidote for DNS cache poisoning attacks[A].Proceedings of International Conference on Communications[C].Piscataway,USA:IEEE,2006.2345-2350.
[12] Yuan L,Chen C C,Mohapatra P,et al.A proxy view of quality of domain name service,poisoning attacks and survival strategies[J].ACM Trans on Internet Technology,2013,12(3):321-329.
[13] Fan L J,Wang Y.Z,Cheng X Q,et al.Prevent DNS cache poisoning using security proxy[A].Proceedings of 12th International Conference on Parallel and Distributed Computing,Applications and Technologies[C].Piscataway,USA:IEEE,2011.387-393.
[14] Mohan J,Puranik S,Chandrasekaran K.Reducing DNS cache poisoning attacks[A].Proceedings of International Conference on Advanced Computing and Communication Systems[C].Piscataway,USA:IEEE,2015.1-6.
[15] 邬江兴.拟态计算与拟态安全防御的原意和愿景[J].电信科学,2014:30(7):2-7. Wu Jiangxin.Meaning and vision of mimic computing and mimic security defense[J].Telecommunications Science,2014,30(7):2-7.(in Chinese)
[16] 邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. Wu Jiangxin.Research on cyber mimic defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese)
[17] 扈红超,陈福才,王禛鹏.拟态防御DHR模型若干问题探讨和性能评估[J].信息安全学报,2016,1(4):40-51. Hu Hongchao,Chen Fucai,Wang Zhenpeng.Performance evaluations on DHR for cyberspace mimic defense[J].Journal of Cyber Security,2016,1(4):40-51.(in Chinese)
[18] Akhshabi S,Dovrolis C.The evolution of layered protocol stacks leads to an hourglass-shaped architecture[A].Proceedings of ACM Special Interest Group on Data Communication[C].New York,NY:ACM,2011.206-217.
[19] 孔政,姜秀柱.DNS欺骗原理及其防御方案[J].计算机工程,2010,36(3):125-127. Kong Zhu,Jiang Xiuzhu.DNS spoofing principle and its defense scheme[J].Computer Engineering,2010,36(3):125-127.(in Chinese)
[20] Gummadi K,Saroiu S,Gribble S.King:Estimating latency between arbitrary Internet end hosts[A].Proceedings of ACM Internet Measurement Workshop[C].New York,USA:ACM,2002.5-18. |