[1] |
Cybersecurity game-change research & development recommendations[EB/OL]. .
|
[2] |
ZHANG M , WANG L , JAJODIA S ,et al. Network diversity:a security metric for evaluating the resilience of networks against zero-day attacks[J]. IEEE Transactions on Information Forensics and Security, 2016,11(5): 1071-1086.
|
[3] |
ZHUANG R , BARDAS A G , DELOACH S A ,et al. A theory of cyber attacks:a step towards analyzing MTD systems[C]// The Second ACM Workshop on Moving Target Defense. ACM, 2015: 11-20.
|
[4] |
SUN K , JAJODIA S . Protecting enterprise networks through attack surface expansion[C]// The 2014 Workshop on Cyber Security Analytics,Intelligence and Automation. ACM, 2014: 29-32.
|
[5] |
石乐义, 贾春福, 吕述望 . 基于端信息跳变的主动网络防护研究[J]. 通信学报, 2008,29(2): 106-110.
|
|
SHI L Y , JIA C F , LYU S W . Research on end hopping for active network confrontation[J]. Journal on Communications, 2008,29(2): 106-110.
|
[6] |
EVANS D , NGUYEN-TUONG A , KNIGHT J . Effectiveness of moving target defenses[M]. Moving Target Defense I: Creating Asymmetric Uncertainty for Cyber Threats.New York,SpringerPress, 2011: 29-48.
|
[7] |
GREEN M , MACFARLAND D C , SMESTAD D R ,et al. Characterizing network-based moving target defenses[C]// ACM CCS Workshop on Moving Target Defense (MTD). 2015.
|
[8] |
CLARK A , SUN K , BUSHNELL L ,et al. A game-theoretic approach to IP address randomization in decoy-based cyber defense[C]// International Conference on Decision and Game Theory for Security. Springer International Publishing, 2015: 3-21.
|
[9] |
ZHUANG R , ZHANG S , DELOACH S A ,et al. Simulation-based approaches to studying effectiveness of moving target network defense[C]// In National Symposium on Moving Target Research,Annapolis, 2012: 21-26.
|
[10] |
ZHUANG R , DELOACH S A , OU X . A model for analyzing the effect of moving target defenses on enterprise networks[C]// The 9th Annual Cyber and Information Security Research Conference. ACM, 2014: 73-76.
|
[11] |
CARROLL T E , CROUSE M , FULP E W ,et al. Analysis of network address shuffling as a moving target defense[C]// Communications (ICC),2014 IEEE International Conference on,Sydney, 2014: 701-706.
|
[12] |
MANADHATA P K . Game theoretic approaches to attack surface shifting[M]. Moving Target Defense II: Application of Game Theory and Adversarial Modeling.New York,SpringerPress, 2013: 1-13.
|
[13] |
OKHRAVI H , RIORDAN J , CARTER K . Quantitative evaluation of dynamic platform techniques as a defensive mechanism[M]. Research in Attacks,Intrusions and Defenses. New York,Springer, 2014: 405-425.
|
[14] |
HAN Y , LU W , XU S . Characterizing the power of moving target defense via cyber epidemic dynamics[C]// The 2014 Symposium and Bootcamp on the Science of Security,Raleigh, 2014: 23-33.
|
[15] |
ZAFFARANO K , TAYLOR J , HAMILTON S . A quantitative framework for moving target defense effectiveness evaluation[C]// The Second ACM Workshop on Moving Target Defense. ACM, 2015: 3-10.
|
[16] |
SHEYNER O , HAINES J , JHA S ,et al. Automated generation and analysis of attack graphs[C]// Security and Privacy,2002.Proceedings.2002 IEEE Symposium on. IEEE, 2002: 273-284.
|
[17] |
WANG L , NOEL S , JAJODIA S . Minimum-cost network hardening using attack graphs[J]. Computer Communications, 2006,29(18): 3812-3824.
|
[18] |
AMMANN P , WIJESEKERA D , KAUSHIK S . Scalable,graph-based network vulnerability analysis[C]// The 9th ACM Conference on Computer and Communications Security. ACM, 2002: 217-224.
|
[19] |
LARSEN P , BRUNTHALER S , FRANZ M . Security through diversity:are we there yet?[J]. IEEE Security & Privacy, 2014,12(2): 28-35.
|
[20] |
MELL P , SCARFONE K , ROMANOSKY S . Common vulnerability scoring system[J]. Security & Privacy,IEEE, 2006,4(6): 85-89.
|
[21] |
FINK G A , HAACK J N , Mckinnon A D ,et al. Defense on the move:ant-based cyber defense[J]. Security & Privacy,IEEE, 2014,12(2): 36-43.
|
[22] |
HONG J B , KIM D S . Performance analysis of scalable attack representation models[M]// Security and Privacy Protection in Information Processing Systems. Springer Berlin Heidelberg, 2013: 330-343.
|
[23] |
王元卓, 林闯, 程学旗 ,等. 基于随机博弈模型的网络攻防量化分析方法[J]. 计算机学报, 2010,33(9): 1748-1762.
|
|
WANG Y Z , LIN C , CHENG X Q ,et al. Analysis for network attack-defense based on stochastic game model[J]. Chinses Journal of Computers, 2010,33(9): 1748-1762.
|
[24] |
HUTCHINS E M , CLOPPERT M J , AMIN R M . Intelligence-driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains[J]. Leading Issues in Information Warfare & Security Research, 2011,1: 80.
|
[25] |
付钰, 李洪成, 吴晓平 ,等. 基于大数据分析的APT攻击检测研究综述[J]. 通信学报, 2015,36(11): 1-14.
|
|
FU Y , LI H C , WU X P ,et al. Detecting APT attacks:a survey from the perspective of big data analysis[J]. Journal of Communications, 2015,36(11): 1-14.
|
[26] |
赵春蕾, 贾春福, 翁臣 ,等. 端信息跳变系统自适应策略研究[J]. 通信学报, 2011 (11A): 47-57.
|
|
ZHAO C L , JIA C F , WENG C ,et al. Research on adaptive strategies for end-hopping system[J]. Journal on Communications, 2011(11A): 47-57.
|
[27] |
SHUE C A , KALAFUT A J , ALLMAN M ,et al. On building inexpensive network capabilities[J]. ACM SIGCOMM Computer Communication Review, 2012,42(2): 72-79.
|
[28] |
YACKOSKI J , BULLEN H , YU X ,et al. Applying self-shielding dynamics to the network architecture[M]// Moving Target Defense II: Application of Game Theory and Adversarial Modeling.New York,SpringerPress, 2013: 978-115.
|