[1] |
石乐义, 贾春福, 吕述望 . 基于端信息跳变的主动网络防护研究[J]. 通信学报, 2008,29(2): 106-110.
|
|
SHI L Y , JIA C F , LU S W . Research on end hopping for active network confrontation[J]. Journal on Communications, 2008,29(2): 106-110.
|
[2] |
JAJODIA S , GHOSH A K , SWARUP V ,et al. Moving target defense:creating asymmetric uncertainty for cyber threats[M]. Springer Ebooks, 2011.
|
[3] |
LAKSHMINARAYANA S , YAU D K Y . Cost-benefit analysis of moving-target defense in power grids[C]// Annual IEEE/IFIP International Conference on Dependable Systems and Networks. IEEE, 2018: 139-150.
|
[4] |
VENKATESAN S , ALBANESE M , AMIN K ,et al. A moving target defense approach to mitigate DDoS attacks against proxy-based architectures[C]// Communications and Network Security. IEEE, 2017: 198-206.
|
[5] |
ZEITZ K , CANTRELL M , MARCHANY R ,et al. Designing a micro-moving target IPV6 defense for the Internet of things[C]// IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation. IEEE/ACM, 2017: 179-184.
|
[6] |
HU H , WU J , WANG Z ,et al. Mimic defense:a designed-in cybersecurity defense framework[J]. IET Information Security, 2017,12(3): 226-237.
|
[7] |
斯雪明, 王伟, 曾俊杰 ,等. 拟态防御基础理论研究综述[J]. 中国工程科学, 2016,18(6): 62-68.
|
|
SI X M , WANG W , ZENG J J . A review of the basic theory of mimic defense[J]. Engineering Sciences, 2016,18(6): 62-68.
|
[8] |
仝青, 张铮, 张为华 ,等. 拟态防御Web服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense web server[J]. Journal of Software, 2017,28(4): 883-897.
|
[9] |
谢慧, 张志刚, 聂峰 . 跳端口在安全P2P即时通信系统中的应用[J]. 武汉理工大学学报(信息与管理工程版), 2011,33(1): 18-21.
|
|
XIE H , ZHANG Z G , NIE F . Application and implementation of port hopping in secure P2P Msystem[J]. Journal of WUT(Information &Management Engineering), 2011,33(1): 18-21.
|
[10] |
张连成, 魏强, 唐秀存 ,等. 基于路径与端址跳变的 SDN 网络主动防御技术[J]. 计算机研究与发展, 2017,54(12): 2748-2758.
|
|
ZHANG L C , WEI Q , TANG X C . Path and port address hopping based sdn proactive defense technology[J]. Journal of Computer Research and Development, 2017,54(12): 2748-2758.
|
[11] |
刘慧生, 王振兴, 郭毅 . 一种基于多穴跳变的 IPV6 主动防御模型[J]. 电子与信息学报, 2012,34(7): 1715-1720.
|
|
LIU H S , WANG Z X , GUO Y . An IPV6 proactive network defense model based on multi-homing hopping[J]. Journal of Electronics &Information Technology, 2012,34(7): 1715-1720.
|
[12] |
周余阳, 程光, 郭春生 ,等. 移动目标防御的攻击面动态转移技术研究综述[J]. 软件学报, 2018,29(9): 2799-2820.
|
|
ZHOU Y Y , CHENG G , GUO C S ,et al. Survey on attack surface dynamic transfer technology based on moving target defense[J]. Journal on Software, 2018,29(9): 2799-2820.
|
[13] |
LIN K , JIA C . Distributed timestamp synchronization for end hopping[J]. China Communications, 2011,8(4): 164-169.
|
[14] |
林楷, 贾春福, 石乐义 . 分布式时间戳同步技术的改进[J]. 通信学报, 2012 33(10): 110-116.
|
|
LIN K , JIA C F , SHI L Y . Improvement of distributed timestamp synchronization[J]. Journal on Communications, 2012,33(10): 110-116.
|
[15] |
林楷, 贾春福 . 基于消息篡改的端信息跳变技术[J]. 通信学报, 2013,34(12): 142-148.
|
|
LIN K , JIA C F . End hopping based on message tampering[J]. Journal on Communications, 2013,34(12): 142-148.
|
[16] |
LUO Y , WANG B , WANG X ,et al. RPAH:random port and address hopping for thwarting internal and external adversaries[C]// IEEE Trustcom/Bigdatase/Ispa. IEEE, 2015.
|
[17] |
LUO Y , WANG B , WANG X . A keyed-hashing based self-synchronization mechanism for port address hopping communication[J]. Frontiers of Information Technology & Electronic Engineering, 2017,18(5): 719-728.
|
[18] |
ZHAO Z , GONG D , LU B ,et al. SDN-based double hopping communication against sniffer attack[J]. Mathematical Problems in Engineering, 2016(2): 1-13.
|
[19] |
孙慧 . 基于端信息跳变的网络音视频通信系统研究与设计[D]. 青岛:中国石油大学(华东), 2018.
|
|
SUN H . Research and design of network audio and video communication system based on end hopping[D]. Qingdao:China University of Petroleum (East China), 2018.
|
[20] |
范晓诗, 李成海, 王昊 . 基于可变时隙与动态同步的端口跳变技术研究[J]. 计算机工程与设计, 2013,34(10): 3465-3469.
|
|
FAN X S , LI C H , WANG H . Research port hopping technology on variable slot and dynamic time synchronization[J]. Computer Engineering and Design, 2013,34(10): 3465-3469.
|
[21] |
刘江, 张红旗, 代向东 ,等. 基于端信息自适应跳变的主动网络防御模型[J]. 电子与信息学报, 2015,37(11): 2642-2649.
|
|
LIU J , ZHANG H Q , DAI X D ,et al. A proactive network defense model based on selfadaptive end hopping[J]. Journal of Electronics &Information Technology, 2015,37(11): 2642-2649
|
[22] |
赵春蕾 . 端信息跳变系统自适应策略研究[D]. 天津:南开大学, 2012.
|
|
ZHAO C L . Research on adaptive strategies for end-hopping system[D]. Tianjin:Nankai University, 2012.
|
[23] |
KUMAR D , DHYANI P , SHARMA A K . Migration of data from one cloud server to another cloud server using the TCP-IP protocol[J]. In ternational Journal of Computer Applications, 2017,157(4): 27-31.
|