[1] |
国家计算机网络应急技术处理协调中心.2018 年中国互联网络网络安全报告[M]. 北京: 人民邮电出版社, 2019.
|
|
National Internet Emergency Center. 2018 Annual report of Chinese Internet security[M]. Beijing: Posts and Telecom PressPress, 2019.
|
[2] |
贾召鹏, 方滨兴, 刘潮歌 ,等. 网络欺骗技术综述[J]. 通信学报, 2017,38(12): 128-143.
|
|
JIA Z P , FANG B X , LIU C G ,et al. Survey on cyber deception[J]. Journal on Communications, 2017,38(12): 128-143.
|
[3] |
胡永进, 马骏, 郭渊博 . 基于博弈论的网络欺骗研究[J]. 通信学报, 2018,39(Z2): 13-22.
|
|
HU Y J , MA J , GUO Y B . Research on cyber deception based on game theory[J]. Journal on Communications, 2018,39(Z2): 13-22.
|
[4] |
WANG C , LU Z . Cyber deception:overview and the road ahead[J]. IEEE Security & Privacy, 2018,16(2): 80-85.
|
[5] |
JAJODIA S , GHOSH A K , SWARUP V ,et al. Moving target defense:creating asymmetric uncertainty for cyber threats[M]. Berlin: SpringerPress, 2011.
|
[6] |
ZHUANG R , DELOACH S A , OU X . Toward a theory of moving target defense[C]// The 2014 ACM Workshop on Moving Target Defense (MTD). ACM, 2014: 31-44.
|
[7] |
JAJODIA S , SUBRAHMANLAN V S , WANG C . Cyber deception:building the scientific foundation[M]. Berlin: SpringerPress, 2016.
|
[8] |
PROVOS N , . A virtual honeypot framework[C]// The 13th USENIX Security Symp. USENIX Association, 2004: 1-14.
|
[9] |
PA Y M P , SUZUKI S , YOSHIOKA K ,et al. IoTPOT:analysing the rise of IoT compromises[C]// The 9th USENIX Conference on Offensive Technologies. USENIX Association, 2015: 9-17.
|
[10] |
FRUNHOLZ D , SCHOTTEN H D . Defending web servers with feints,distraction and obfuscation[C]// The International Conference on Computer Network and Communications(ICNC). IEEE, 2018: 21-25.
|
[11] |
AHMED H M , HASSAN N F , FAHAD A A . Designing a smartphone honeypot system using performance counters[J]. Karbala International Journal of Modern Science, 2017,3(1): 46-52.
|
[12] |
YEHUDA R B , KEVORKIAN D , ZAMIR G L ,et al. Virtual USB honeypot[C]// 12th ACM International Conference on Systems and Storage. ACM, 2019:181.
|
[13] |
JICHA A , PATTON M , CHEN H . SCADA honeypots:an in-depth analysis of Conpot[C]// IEEE International Conference on Intelligence& Security Informatics. IEEE, 2016: 196-198.
|
[14] |
JUELS A , RIVEST R L . Honeywords:making password-cracking detectable[C]// ACM Sigsac Conference on Computer & Communications Security. ACM, 2013: 145-160.
|
[15] |
ARAUJO F , HAMLEN K W , BIEDERMANN S ,et al. From patches to honey-patches:lightweight attacker misdirection,deception,and disinformation[C]// ACM Sigsac Conference on Computer & Communications Security. ACM, 2014: 942-953.
|
[16] |
CONROY N J , RUBIN V L , CHEN Y . Automatic deception detection:methods for finding fake news[C]// ASIST. Wiley Online Library, 2015: 1-4.
|
[17] |
LEE K , CAVERLEE J , WEBB S . The social honeypot project:protecting online communities from spammers[C]// The 19th International Conference on World Wide Web. ACM, 2010: 1139-1140.
|
[18] |
LAZAROV M , ONAOLAPO J , STRINGHINI G . Honey sheets:what happens to leaked google spreadsheets?[C]// 9th USENIX Workshop on Cyber Security Experimentation and Test. USENIX Association, 2016: 1-8.
|
[19] |
YOON J W , KIM H , JO H J ,et al. Visual honey encryption:application to steganography[C]// 3rd ACM Workshop on Information Hiding and Multimedia Security. ACM, 2015: 65-74.
|
[20] |
OMOLARA A E , JANTAN A , ABIODUN O S ,et al. A deception model robust to eavesdropping over communication for social network systems[J]. IEEE Access, 2019,7(8): 100881-10898.
|
[21] |
CLARK A , SUN K , POOVENDRAN R . Effectiveness of IP address randomization in decoy-based moving target defense[C]// 52nd IEEE Conference on Decision and Control. IEEE, 2013: 678-685.
|
[22] |
SUN J , SUN K . DESIR:decoy-enhanced seamless IP randomization[C]// IEEE International Conference on Computer Communications(INFOCOM). IEEE, 2016: 1-9.
|
[23] |
SUN J , SUN K , LI Q . CyberMoat:camouflaging critical server infrastructures with large scale decoy farms[C]// IEEE Conference on Communincations and Network Security (CNS). IEEE, 2017: 1-9.
|
[24] |
VENKATESAN S , ALBANESE M , SHAH A ,et al. Detecting stealthy botnets in a resource-constrained environment using reinforcement learning[C]// 4th ACM Workshop on Moving Target Defense(MTD). ACM, 2017: 75-85.
|
[25] |
石乐义, 李婕, 刘昕 ,等. 基于动态阵列蜜罐的协同网络防御策略研究[J]. 通信学报, 2012,33(11): 159-164.
|
|
SHI L Y , LI J , LIU X ,et al. Research on dynamic array honeypot for collaborative network defense strategy[J]. Journal on Comunications, 2012,33(11): 159-164.
|
[26] |
CHEN X Y , LIU X T , ZHANG L ,et al. Optimal defense strategy selection for spear-phishing attack based on a multistate signaling game[J]. IEEE Access, 2019,7(2): 19907-19921.
|
[27] |
CARROLL T E , GROSU D . A game theoretic investigation of deception in network security[J]. Security & Communication Networks, 2011,4(10): 1162-1172.
|
[28] |
FENG X T , ZHENG Z Z , CANSEVER D ,et al. A signaling game model for moving target defense[C]// IEEE International Conference on Computer Communications(INFOCOM). IEEE, 2017: 1-9.
|
[29] |
蒋侣, 张恒巍, 王晋东 . 基于信号博弈的移动目标防御最优策略选取方法[J]. 通信学报, 2019,40(6): 128-137.
|
|
JIANG L , ZHANG H W , WANG J D . Optimal strategy selection method for moving target defense based on signaling game[J]. Journal on Communications, 2019,40(6): 128-137.
|
[30] |
JAJODIA S , PARK N,SERRA ,et al. SHARE:a stackelberg honey-based adversarial reasoning engine[J]. ACM Transactions on Internet Technology, 2018,18(3): 1-41.
|
[31] |
王硕, 王建华, 汤光明 ,等. 一种智能高效的最优渗透路径生成方法[J]. 计算机研究与发展, 2019,56(5): 929-941.
|
|
WANG S , WANG J H , TANG G M ,et al. Intelligent and efficient method for optimal penetration path generation[J]. Journal of Computer Research and Development, 2019,56(5): 929-941.
|
[32] |
NASH J F . Equilibrium points in n-person games[J]. National Academy of Sciences, 1950,36(1): 48-49.
|