[1] |
Wu Jiang-xing. Introduction to cyberspace mimic defense[M].Beijing:Science Press,2017.(in Chinese)
|
[2] |
Pietro R D, Mancini L V. Intrusion detection systems[M]. Berlin:Springer Science & Business Media,2008.
|
[3] |
Panda B K,Pradhan M,Pradhan S K.Intrusion prevention system[M]∥Network Security Attacks and Countermea- sures.Hershey:IGI Global,2016:245-258.
|
[4] |
Oppliger R. Internet security:Firewalls and beyond [J].Communications of the ACM,1997,40(5):92-102.
|
[5] |
Reis C, Barth A, Pizano C. Browser security:Lessons from Google Chrome[J].Communications of the ACM, 2009,52(8):45-49.
|
[6] |
Perdisci R,Dagon D,Lee W,et al.Misleading worm signature generators using deliberate noise injection[C]∥Proc of IEEE Symposium on Security & Privacy,2006:17-31.
|
[7] |
Shen Chang-xiang, Zhang Da-wei,Liu Ji-qiang,et al.The strategy of TC 3.0:A revolutionary evolution in trusted computing[J].Strategic Study of Chinese Academy of Engineering,2016,18(6):53-57.(in Chinese)
|
[8] |
Shen Chang-xiang,Chen Xing-shu.Construction of the information security infrastructure based on trusted computing[J]. Journal of Sichuan University(Engineering Sciences Edition),2014,46(1):1-7.(in Chinese)
|
[9] |
Jafarian J H,Alshaer E,Duan Q,et al.An effective address mutation approach for disrupting reconnaissance attacks [J].IEEE Transactions on Information Forensics and Security,2015,10(12):2562-2577.
|
[10] |
Jafarian J H,Alshaer E,Duan Q,et al.Adversary-aware IP address randomization for proactive agility against sophisticated attackers[C]∥Proc of International Conference on Computer Communications,2015:738-746.
|
[11] |
Luo Y,Wang B,Cai G,et al.Effectiveness of port hopping as a moving target defense[C]∥Proc of International Workshop on Security,2014:7-10.
|
[12] |
Azab M,Eltoweissy M.ChameleonSoft:Software behavior encryption for moving target defense[J].Mobile Networks and Applications,2013,18(2):271-292.
|
[13] |
Ma Hai-long,Jiang Yi-ming,Bai Bing,et al.Tests and analyses for mimic defense ability of routers[J].Journal of Cyber Security,2017,2(1):43-53.(in Chinese)
|
[14] |
Song Ke,Liu Qin-rang,Wei Shuai,et al.Endogenous security architecture of Ethernet switch based on mimic defense[J].Journal on Communications,2020,41(5):18-26. (in Chinese)
|
[15] |
Sakic E,Deric N,Kellerer W,et al.MORPH:An adaptive framework for efficient and Byzantine fault-tolerant SDN control plane[J].IEEE Journal on Selected Areas in Communications,2018,36(10):2158-2174.
|
[16] |
Wu Jiang-xing.Research on cyber mimic defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese)
|
[17] |
Wu Jiang-xing. Meaning and vision of mimic computing and mimic security defense[J].Telecommunications Science,2014,30(7):2-7.(in Chinese)
|
[18] |
Ma Hai-long,Yi Peng,Jiang Yi-ming,et al.Dynamic hete- rogeneous redundancy based router architecture with mimic defenses[J].Journal of Cyber Security,2017,2(1):29-42.(in Chinese)
|
[19] |
Fan Shuang-jiao.The research of topology discovery and attack detection technology based on OSPF protocol[D].Beijing:Beijing University of Posts and Telecommunications,2015.(in Chinese)
|
[20] |
Yang Xiao-dong,Liu Yu-zhen,Zhang Huan-guo,et al. Ana- lysis of authentication of OSPF routing protocol[J].Computer Engineering and Design,2005,26(1):18-21.(in Chinese)
|
[21] |
Moy J. OSPF version 2:RFC 2328[S].1998-04.
|
[22] |
Nakibly G,Menahem E,Waizel A,et al.Owning the routing table:part II [C]∥Proc of Black Hat 2013, 2013:1-19.
|
|
附中文参考文献:
|
[1] |
邬江兴.网络空间拟态防御导论(上册)[M].北京:科学出版社,2017.
|
[7] |
沈昌祥,张大伟,刘吉强,等.可信3.0战略:可信计算的革命性演变[J].中国工程科学,2016,18(6):53-57.
|
[8] |
沈昌祥,陈兴蜀.基于可信计算构建纵深防御的信息安全保障体系[J].四川大学学报(工程科学版),2014,46(1):1-7.
|
[13] |
马海龙,江逸茗,白冰,等.路由器拟态防御能力测试与分析[J].信息安全学报,2017,2(1):43-53.
|
[14] |
宋克,刘勤让,魏帅,等.基于拟态防御的以太网交换机内生安全体系结构[J].通信学报,2020,41(5):18-26.
|
[16] |
邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10.
|
[17] |
邬江兴.拟态计算与拟态安全防御的原意和愿景[J].电信科学,2014,30(7):2-7.
|
[18] |
马海龙,伊鹏,江逸茗,等.基于动态异构冗余机制的路由器拟态防御体系结构[J].信息安全学报,2017,2(1):29-42.
|
[19] |
范双娇.基于OSPF协议的拓扑发现与攻击检测技术研究[D].北京:北京邮电大学,2015.
|
[20] |
杨晓东,刘玉珍,张焕国,等.OSPF路由协议的认证分析[J].计算机工程与设计,2005,26(1):18-21
|