[1] |
邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10.
|
|
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10.
|
[2] |
WANG X , REEVES D S , WU S F ,et al. Sleepy watermark tracing:An active network-based intrusion response framework[C]// IFIP International Information Security Conference. 2001: 369-384.
|
[3] |
YU W , FU X , GRAHAM S ,et al. DSSS-based flow marking technique for invisible traceback[C]// 2007 IEEE Symposium on Security and Privacy (SP'07). 2007: 18-32.
|
[4] |
JIA W , TSO F P , LING Z ,et al. Blind detection of spread spectrum flow watermarks[J]. Security and Communication Networks, 2013,6(3): 257-274.
|
[5] |
HUANG J , PAN X , FU X ,et al. Long PN code based DSSS watermarking[C]// Proceedings IEEE INFOCOM. 2011: 2426-2434.
|
[6] |
ZHANG L , WANG Z , WANG Q ,et al. MSAC and multi-flow attacks resistant spread spectrum watermarks for network flows[C]// 2nd IEEE International Conference on Information and Financial Engineering. 2010: 438-441.
|
[7] |
XU X , ZHANG L , YAN J . PN code diversification based spread spectrum flow watermarking technology[C]// 14th International Conference on Computational Intelligence and Security (CIS). 2018: 254-258.
|
[8] |
WANG X , REEVES D S , WU S F . Inter-packet delay based correlation for tracing encrypted connections through stepping stones[C]// European Symposium on Research in Computer Security. 2002: 244-263.
|
[9] |
WANG X , REEVES D S . Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays[C]// Proceedings of the 10th ACM Conference on Computer and Communications Security. 2003: 20-29.
|
[10] |
HOUMANSADR A , KIYAVASH N , BORISOV N . Rainbow:A robust and invisible non-blind watermark for network flows[C]// NDSS. 2009: 406-422.
|
[11] |
HOUMANSADR A , BORISOV N . The need for flow fingerprints to link correlated network flows[C]// International Symposium on Privacy Enhancing Technologies Symposium. 2013: 205-224.
|
[12] |
SOLTANI R , GOECKEL D , TOWSLEY D ,et al. Fundamental limits of invisible flow fingerprinting[J]. IEEE Transactions on Information Forensics and Security, 2019,15: 345-360.
|
[13] |
REZAEI F , HOUMANSADR A . FINN:fingerprinting network flows using neural networks[C]// Annual Computer Security Applications Conference. 2021: 1011-1024.
|
[14] |
IACOVAZZI A , SARDA S , ELOVICI Y . Inflow:Inverse network flow watermarking for detecting hidden servers[C]// IEEE INFOCOM 2018-IEEE Conference on Computer Communications. 2018: 747-755.
|
[15] |
IACOVAZZI A , SARDA S , FRASSINELLI D ,et al. DropWat:An invisible network flow watermark for data exfiltration traceback[J]. IEEE Transactions on Information Forensics and Security, 2017,13(5): 1139-1154.
|
[16] |
YAO Z , ZHANG L , GE J ,et al. An invisible flow watermarking for traffic tracking:A hidden markov model approach[C]// IEEE International Conference on Communications. 2019: 1-6.
|
[17] |
PYUN Y J , PARK Y H , WANG X ,et al. Tracing traffic through intermediate hosts that repacketize flows[C]// IEEE INFOCOM 2007-26th IEEE International Conference on Computer Communications. 2007: 634-642.
|
[18] |
HOUMANSADR A , BORISOV N . SWIRL:A scalable watermark to detect correlated network flows[C]// NDSS. 2011.
|
[19] |
MO L , LYU G , WANG B ,et al. The design and implementation of an efficient quaternary network flow watermark technology[C]// 17th International Conference on Mobility,Sensing and Networking (MSN). 2021: 746-751.
|
[20] |
REZAEI F , HOUMANSADR A . TagIt:Tagging network flows using blind fingerprints[J]. Proc Pri Enhancing Technol, 2017,2017(4): 290-307.
|
[21] |
罗跃斌 . 网络主动防御关键技术研究[D]. 长沙:国防科学技术大学, 2017.
|
|
LUO Y B . Research on key technologies of network active de fense[D]. Changsha:National University of Defense Technology, 2017.
|
[22] |
LIU W , LIU G , XIA Y ,et al. Using insider swapping of time intervals to perform highly invisible network flow watermarking[J]. Security and Communication Networks,2018, 2018.
|
[23] |
WANG X , CHEN S , JAJODIA S . Network flow watermarking attack on low-latency anonymous communication systems[C]// 2007 IEEE Symposium on Security and Privacy (SP'07). 2007: 116-130.
|
[24] |
ZHANG L , LUO J , YANG M . An improved DSSS-based flow marking technique for anonymous communication traceback[C]// Symposia and Workshops on Ubiquitous,Autonomic and Trusted Computing. 2009: 563-567.
|
[25] |
HOU J , LI Q , TAN R ,et al. An intrusion tracking watermarking scheme[J]. IEEE Access, 2019,7: 141438-141455.
|
[26] |
WANG X , LUO J , YANG M . An interval centroid based spread spectrum watermark for tracing multiple network flows[C]// IEEE International Conference on Systems,Man and Cybernetics. 2009: 4000-4006.
|
[27] |
WANG X , LUO J , YANG M . A double interval centroid-based watermark for network flow traceback[C]// The 14th International Conference on Computer Supported Cooperative Work in Design. 2010: 146-151.
|
[28] |
LIU Y , GHOSAL D , ARMKNECHT F ,et al. Robust and undetectable steganographic timing channels for IID traffic[C]// International Workshop on Information Hiding. 2010: 193-207.
|