[1] |
LIU Y , PENG W , SU J . A study of IP prefix hijacking in cloud computing networks[J]. Security and Communication Networks, 2014,7(11): 2201-2210.
|
[2] |
WANG T , WANG H , LIU B ,et al. Further analyzing the sybil attack in mitigating peer-to-peer botnets[J]. KSII Transactions on Internet & Information Systems, 2012,6(10).
|
[3] |
WANG F , WANG H , WANG X ,et al. A new multistage approach to detect subtle DDoS attacks[J]. Mathematical and Computer Modelling, 2012,55(1): 198-213.
|
[4] |
ZDNet C , ZACK W . PRISM:here’s how the NSA wiretapped the Internet[EB/OL]. .
|
[5] |
CODENOMICON. The heartbleed bug[EB/OL]. .
|
[6] |
CLARK A , SUN K , POOVENDRAN R . Effectiveness of IP address randomization in decoy-based moving target defense[C]// The 52nd IEEE Conference on Decision and Control. 2013: 678-685.
|
[7] |
MANADHATA P , . Game theoretic approaches to attack surface shifting[M]// Moving Target Defense II:Application of Game Theory and Adversarial Modeling. 2013: 1-13.
|
[8] |
CROUSE M , PROSSER B , FULP E . Probabilistic performance analysis of moving target and deception reconnaissance defenses[C]// The Second ACM Workshop on Moving Target Defense. 2015: 21-29.
|
[9] |
ZHU Q , BA?AR T , . Game-theoretic approach to feedback-driven multi-stage moving target defense[C]//. The 4th International Conference on Decision and Game Theory for Security-Volume 8252.
|
[10] |
CAI G L , WANG B S , HU W ,et al. Moving target defense:state of the art and characteristics[J]. Frontiers of Information Technology& Electronic Engineering, 2016,17(11): 1122-1153.
|
[11] |
NITRDSubcommittee National cyber leap year summit 2009 co-chairs’ report[EB/OL]. .
|
[12] |
AZAB M , HASSAN R , ELTOWEISSY M . ChameleonSoft:a moving target defense system[C]// The 7th International Conference on Collaborative Computing:Networking,Applications and Worksharing (CollaborateCom). 2011: 241-250.
|
[13] |
OKHRAVI H , COMELLA A , ROBINSON E ,et al. Creating a cyber moving target for critical infrastructure applications[M]// Critical Infrastructure Protection V. Berlin Heidelberg:Springer, 2011: 107-123.
|
[14] |
HUANG Y , GHOSH A . Introducing diversity and uncertainty to create moving attack surfaces for Web services[M]// Moving Target Defense:Creating Asymmetric Uncertainty for Cyber Threats. 2011: 131-151.
|
[15] |
DEBROY S , CALYAM P , NGUYEN M ,et al. Frequency-minimal moving target defense using software-defined networking[C]// 2016 International Conference on Computing,Networking and Communications (ICNC). 2016: 1-6.
|
[16] |
LUO Y , WANG B , WANG X ,et al. RPAH:random port and address hopping for thwarting internal and external adversaries[C]// 2015 IEEE Trustcom/BigDataSE/ISPA. 2015: 263-270.
|
[17] |
周志华 . 机器学习[M]. 北京: 清华大学出版社, 2016.
|
|
ZHOU Z H . Machine learning[M]. Beijing: Tsinghua University PressPress, 2016.
|
[18] |
BERAUD P , CRUZ A , HASSELL S ,et al. Using cyber maneuver to improve network resiliency[C]// 2011 Military Communications Conference (MILCOM 2011). 2011: 1121-1126.
|
[19] |
KUHL M E , KISTNER J , COSTANTINI K ,et al. Cyber attack modeling and simulation for network security analysis[C]// The 39th Conference on Winter Simulation. 2007: 1180-1188.
|
[20] |
BERAUD P , CRUZ A , HASSELL S ,et al. Cyber defense network maneuver commander[C]// 2010 IEEE International Carnahan Conference on Security Technology (ICCST). 2010: 112-120.
|