[1] |
JITHIN R , CHANDRAN P . Virtual machine isolation[C]// International Conference on Security in Computer Networks and Distributed Systems, 2014.
|
[2] |
JAJODIA S , SUBRAHMANIAN V S , SWARUP V ,et al. Cyber deception[R]. 2016.
|
[3] |
VINCENT E U , . Computer network deception as a moving target defense[C]// 2015 International Carnahan Conference on Security Technology (ICCST), 2015: 1-6.
|
[4] |
NAAGAS M A . Defense-through-deception network security model:securing university campus network from DoS/DDoS attack[J]. Bulletin of Electrical Engineering and Informatics, 2018: 593-600.
|
[5] |
SI-YAO L , QIANG L I , BIN LI . Research on isolation of container based on docker technology[J]. Computer Engineering & Software, 2015.
|
[6] |
ZHENG Z . Virtual machine security isolation and protection based on cloud platform[J]. China Computer & Communication, 2018.
|
[7] |
ABDELRAHEM O , BAHAA-ELDIN A M , TAHA A . Virtualization security:a survey[C]// International Conference on Computer Engineering & Systems. 2017.
|
[8] |
SONG X , MA Y , TENG D . A load balancing scheme using federate migration based on virtual machines for cloud simulations[J]. Mathematical Problems in Engineering, 2015,5: 1-11.
|
[9] |
PRASAD T S , MALLIKARJUNA A , RAMAKRISHNA S . From cloud to fog computing:a review and a conceptual live VM migration framework[J]. IEEE Access, 2017,99: 1-1.
|
[10] |
ZHANG Y , LI M , BAI K ,et al. Incentive compatible moving target defense against VM-colocation attacks in clouds[C]// IFIP International Information Security Conference. 2012.
|
[11] |
PENNER T , GUIRGUIS M . Combating the bandits in the cloud:a moving target defense approach[C]// IEEE/ACM International Symposium on Cluster, 2017.
|
[12] |
YANG C , GUO Y , HU H ,et al. An effective and scalable VM migration strategy to mitigate cross-VM side-channel attacks in cloud[J]. Networks & Security, 2019: 151-171.
|
[13] |
HORáK K , . Manipulating adversary’s belief:a dynamic game approach to deception by design for proactive network security[C]// 8th International Conference on Decision and Game Theory for Security. 2017: 273-294.
|
[14] |
XIAO Z , JIANG J , ZHU Y ,et al. A solution of dynamic VMs placement problem for energy consumption optimization based on evolutionary game theory[J]. Journal of Systems & Software, 2015,101(3): 260-272.
|
[15] |
LEI C , ZHANG H Q , WAN L M ,et al. Incomplete information markov game theoretic approach to strategy generation for moving target defense[J]. Computer Communications, 2018,116(1): 184-199.
|
[16] |
ADILI M T , MOHAMMADI A , MANSHAEI M H ,et al. A cost-effective security management for clouds:a game-theoretic deception mechanism[C]// Integrated Network & Service Management. 2017: 98-106.
|
[17] |
冷强, 杨英杰, 常德显 ,等. 面向网络实时对抗的动态防御决策方法[J]. 网络与信息安全学报, 2019,5(6): 58-66.
|
|
LENG Q , YANG Y J , CHANG D X ,et al. Dynamic defense decision method for network real-time confrontation[J]. Chinese Journal of Network and Information Security, 2019,5(6): 58-66.
|
[18] |
ALNAIM A , ALWAKEEL A , FERNANDEZ E B . A misuse pattern for compromising VMs via virtual machine escape in NFV[C]// The 14th International Conference. 2019.
|
[19] |
FENGW , SHI X H , WANG W R . Eliminating object reference checks by escape analysis on real-time Java virtual machine[J]. Cluster Computing:The Journal of Networks,Software Tools and Applications, 2019,22(3).
|
[20] |
KOCHER P . Spectre attacks:exploiting speculative execution[J]. Communications of the ACM, 2018.
|
[21] |
ALMOHANNADI H , . Cyber threat intelligence from honeypot data using elasticsearch[C]// 2018 IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA). 2018: 900-906.
|
[22] |
SARKALE V V , RAD P , LEE W . Secure cloud container:runtime behavior monitoring using most privileged container (MPC)[C]// IEEE International Conference on Cyber Security & Cloud Computing. 2017.
|
[23] |
KRISHNAVENI S , PRABAKARAN S , SIVAMOHAN S . A survey on honeypot and honeynet systems for intrusion detection in cloud environment[J]. Journal of Computational and Theoretical Nanoence, 2018.
|
[24] |
SAXENA A , . Virtual public cloud model in honeypot for data security:a new technique[C]// 5th International Conference on Computing and Artificial Intelligence. 2019: 66-71.
|