[1] |
JAJODIAS , GHOSH AK , SWARUP V ,et al. Moving target defense:creating asymmetric uncertainty for cyber threats[J]. Springer Ebooks, 2011: 54.
|
[2] |
蔡桂林, 王宝生, 王天佐 ,等. 移动目标防御技术研究进展[J]. 计算机研究与发展, 2016,53(5): 968-987.
|
|
CAI G L , WANG B S , WANG T Z ,et al. Research and development of moving target defense technology[J]. Journal of Computer Research and Development, 2016,53(5): 968-987.
|
[3] |
WHITLEY J N , PHAN R C W , WANG J ,et al. Attribution of attack trees[J]. Computers & Electrical Engineering, 2011,37(4): 624-628.
|
[4] |
DALTON II G C , EDGE K S , MILLS R F ,et al. Analysing security risks in computer and radio frequency identification (RFID) networks using attack and protection trees[J]. International Journal of Security and Networks, 2010,5(2/3): 87-95.
|
[5] |
AMMANN P , PAMULA J , RITCHEY R ,et al. A host-based approach to network attack chaining analysis[C]// Computer Security Applications Conference. 2005: 72-84.
|
[6] |
叶子维, 郭渊博, 王宸东 ,等. 攻击图技术应用研究综述[J]. 通信学报, 2017,38(11): 121-132.
|
|
YE Z W , GUO Y B , WANG C D ,et al. Survey on application of attack graph technology[J]. Journal on Communications, 2017,38(11): 121-132.
|
[7] |
POOLSAPPASIT N , DEWRI R , RAY I . Dynamic security risk management using Bayesian attack graphs[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(1): 61-74.
|
[8] |
MIEHLING E , RASOULI M , TENEKETZIS D . Optimal defense policies for partially observable spreading processes on bayesian attack graphs[C]// ACMWorkshop on Moving Target Defense. 2015: 67-76.
|
[9] |
NGUYEN T H , WRIGHT M , WELLMAN M P ,et al. Multi-stage attack graph security games:heuristic strategies,with empirical game-theoretic analysis[C]// ACM Workshop on Moving Target Defense. 2017: 87-97.
|
[10] |
BOPCHE G S , MEHTRE B M . Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks[J]. Computers & Security, 2017,64: 16-43.
|
[11] |
陈小军, 方滨兴, 谭庆丰 ,等. 基于概率攻击图的内部攻击意图推断算法研究[J]. 计算机学报, 2014,37(1): 62-72.
|
|
CHEN X J , FANG B X , TAN Q F ,et al. Inferring attack intent of malicious insider based on probabilistic attack graph model[J]. Chinese Journal of Computers, 2014,37(1): 62-72.
|
[12] |
高妮, 高岭, 贺毅岳 ,等. 基于贝叶斯攻击图的动态安全风险评估模型[J]. 四川大学学报(工程科学版), 2016,48(1): 111-118.
|
|
GAO N , GAO L , HE Y Y ,et al. Dynamic security risk assessment model based on Bayesian attack graph[J]. Journal of Sichuan University(Engineering Science Editon), 2016,48(1): 111-118.
|
[13] |
刘威歆, 郑康锋, 武斌 ,等. 基于攻击图的多源告警关联分析方法[J]. 通信学报, 2017,36(9): 135-144.
|
|
LIU W X , ZHENG K F , WU B ,et al. Alert processing based on attack graph and multi-source analyzing[J]. Journal on Communications, 2017,36(9): 135-144.
|
[14] |
雷程, 马多贺, 张红旗 ,等. 基于变点检测的网络移动目标防御效能评估方法[J]. 通信学报, 2017,38(1): 126-140.
|
|
LEI C , MA D H , ZHANG H Q ,et al. Performance assessment approach based on change-point detection for network moving target defense[J]. Journal on Communications, 2017,38(1): 126-140.
|
[15] |
HOWARD M , PINCUS J , WING J M . Measuring relative attack surfaces[J]. Computer Security in the 21st Century, 2003: 109-137.
|
[16] |
MANADHATA P K , WING J M . An attack surface metric[J]. IEEE Transactions on Software Engineering, 2011,37(3): 371-386.
|
[17] |
PENG W , LI F , HUANG C T ,et al. A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces[C]// IEEE International Conference on Communications. 2014: 804-809.
|
[18] |
SUN K , JAJODIA S . Protecting enterprise networks through attack surface expansion[C]// Workshop on Cyber Security Analytics,Intelligence and Automation. 2014: 29-32.
|
[19] |
CYBENKO G , JAJODIA S , WELLMAN M P ,et al. Adversarial and uncertain reasoning for adaptive cyber defense:building the scientific foundation[C]// International Conference on Information Systems Security. 2014: 1-8.
|
[20] |
FOREMAN J C , GURUGUBELLI D . Identifying the cyber attack surface of the advanced metering infrastructure[J]. The Electricity Journal, 2015,28(1): 94-103.
|
[21] |
PEARL J . Probabilistic reasoning in intelligent system[M]. Morgan Kaufinann: Network of Plausible Inference, 1988: 1-86.
|
[22] |
MELL P M , KENT K A , ROMANOSKY S . The common vulnerability scoring system (CVSS) and its applicability to federal agency systems[J]. NIST Interagency/Internal Report (NISTIR) - 7435, 2007,1(1): 119-127.
|
[23] |
ZANGENEH V , SHAJARI M . A cost-sensitive move selection strategy for moving target defense[J]. Computers & Security, 2018(75): 72-91.
|