[1] |
GANNON D , BARGA R , SUNDARESAN N . Cloud-native applications[J]. IEEE Cloud Computing, 2017,4(5): 16-21.
|
[2] |
TH?NES J . Microservices[J]. IEEE Software, 2015,32(1): 116.
|
[3] |
LUO S T , XU H L , LU C Z ,et al. Characterizing microservice dependency and performance:Alibaba trace analysis[C]// Proceedings of the ACM Symposium on Cloud Computing. New York:ACM Press, 2021: 412-426.
|
[4] |
NIFE F N , KOTULSKI Z . Application-aware firewall mechanism for software defined networks[J]. Journal of Network and Systems Management, 2020,28(3): 605-626.
|
[5] |
BáNáTI A , KAIL E , KARóCZKAI K ,et al. Authentication and authorization orchestrator for microservice-based software architectures[C]// Proceedings of 2018 41st International Convention on Information and Communication Technology,Electronics and Microelectronics. Piscataway:IEEE Press, 2018: 1180-1184.
|
[6] |
BARDAS A G , SUNDARAMURTHY S C , OU X ,et al. MTD CBITS:moving target defense for cloud-based IT systems[C]// Proceedings of 22nd European Symposium on Research in Computer Security. Berlin:Springer, 2017: 167-186.
|
[7] |
TORKURA K A , SUKMANA M I H , KAYEM A V D M ,et al. A cyber risk based moving target defense mechanism for microservice architectures[C]// Proceedings of 2018 IEEE International Conference on Parallel & Distributed Processing with Applications,Ubiquitous Computing & Communications,Big Data & Cloud Computing,Social Computing & Networking,Sustainable Computing & Communications. Piscataway:IEEE Press, 2018: 932-939.
|
[8] |
JIN H , LI Z , ZOU D Q ,et al. DSEOM:a framework for dynamic security evaluation and optimization of MTD in container-based cloud[J]. IEEE Transactions on Dependable and Secure Computing, 2019,18(3): 1125-1136.
|
[9] |
张帅, 郭云飞, 孙鹏浩 ,等. 云原生下基于深度强化学习的移动目标防御策略优化方案[J]. 电子与信息学报, 2023,45(2): 608-616.
|
|
ZHANG S , GUO Y F , SUN P H ,et al. Optimization scheme of moving target defense strategy based on deep reinforcement learning in cloud native environment[J]. Journal of Electronics & Information Technology, 2023,45(2): 608-616.
|
[10] |
DUC T L , LEIVA R G , CASARI P ,et al. Machine learning methods for reliable resource provisioning in edge-cloud computing:a survey[J]. ACM Computing Surveys, 2020,52(5): 1-39.
|
[11] |
ZHOU D C , CHEN H C , SHANG K ,et al. Cushion:a proactive resource provisioning method to mitigate SLO violations for containerized microservices[J]. IET Communications, 2022,16: 2105-2122.
|
[12] |
YADAV T , RAO A M . Technical aspects of cyber kill chain[C]// Proceedings of International Symposium on Security in Computing and Communication. Berlin:Springer, 2015: 438-452.
|
[13] |
NOUREDDINE M A , FAWAZ A , SANDERS W H ,et al. A game-theoretic approach to respond to attacker lateral movement[C]// Proceedings of 7th International Conference on Decision and Game Theory for Security. New York:ACM Press, 2016: 294-313.
|
[14] |
ALMOHRI H M J , WATSON L T , EVANS D . Misery digraphs:delaying intrusion attacks in obscure clouds[J]. IEEE Transactions on Information Forensics and Security, 2018,13(6): 1361-1375.
|
[15] |
张福, 程度, 胡俊 . ATT&CK框架实践指南[M]. 北京: 电子工业出版社, 2022.
|
|
ZHANG F , CHENG D , HU J . ATT&CK framework practice guide[M]. Beijing: Publish House of Electronics Industry, 2022.
|
[16] |
GAN Y , ZHANG Y Q , CHENG D L ,et al. An open-source benchmark suite for microservices and their hardware-software implications for cloud & edge systems[C]// Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems. New York:ACM Press, 2019: 3-18.
|
[17] |
CHO J H , SHARMA D P , ALAVIZADEH H ,et al. Toward proactive,adaptive defense:a survey on moving target defense[J]. IEEE Communications Surveys & Tutorials, 2020,22(1): 709-745.
|
[18] |
CAI G L , WANG B S , HU W ,et al. Moving target defense:state of the art and characteristics[J]. Frontiers of Information Technology & Electronic Engineering, 2016,17(11): 1122-1153.
|
[19] |
ZHANG X , SEN S , KURNIAWAN D ,et al. E2E:embracing user heterogeneity to improve quality of experience on the web[C]// Proceedings of the ACM Special Interest Group on Data Communication. New York:ACM Press, 2019: 289-302.
|
[20] |
GIAS A U , CASALE G , WOODSIDE M . ATOM:model-driven autoscaling for microservices[C]// Proceedings of 2019 IEEE 39th International Conference on Distributed Computing Systems (ICDCS). Piscataway:IEEE Press, 2019: 1994-2004.
|
[21] |
LI Z , JIN H , ZOU D Q ,et al. Exploring new opportunities to defeat low-rate DDoS attack in container-based cloud environment[J]. IEEE Transactions on Parallel and Distributed Systems, 2019,31(3): 695-706.
|
[22] |
BHASI V M , GUNASEKARAN J R , THINAKARAN P ,et al. Kraken:adaptive container provisioning for deploying dynamic DAGs in serverless platforms[C]// Proceedings of the ACM Symposium on Cloud Computing. New York:ACM Press, 2021: 153-167.
|
[23] |
MNIH V , KAVUKCUOGLU K , SILVER D ,et al. Human-level control through deep reinforcement learning[J]. Nature, 2015,518(7540): 529-533.
|
[24] |
ABELS A , ROIJERS D , LENAERTS T ,et al. Dynamic weights in multi-objective deep reinforcement learning[C]// Proceedings of International Conference on Machine Learning. Saarland:DBLP, 2019: 11-20.
|