[1] LINDSTROM P.Understanding intrusion prevention[EB/OL].[2020-07-03].http://www.networkassociates.com/us/_local/promos/_media/wp_spire.pdf. [2] LIU Hui,LIU Songhua.Distributed firewall with intrusion detection system techniques[J].Advanced Science Letters,2013,19(11):3297-3300. [3] WANG Junfeng.Building a secure network environment with zero trust architecture[J].Security & Informatization,2020(5):118-121.(in Chinese)王军峰.零信任架构构建安全网络环境[J].网络安全和信息化,2020(5):118-121. [4] LIU Huan,YANG Shuai,LIU Hao.Zero trust security architecture and application[J].Communications Technology,2020,53(7):1745-1749.(in Chinese)刘欢,杨帅,刘皓.零信任安全架构及应用研究[J].通信技术,2020,53(7):1745-1749. [5] WU Jiangxing.Research on cyber mimic defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese)邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. [6] ZHU Weijun,GUO Yuanbo,HUANG Bohu.A mimic defense automaton model of dynamic heterogeneous redundancy structures[J].Acta Electronica Sinica,2019,47(10):2025-2031.(in Chinese)朱维军,郭渊博,黄伯虎.动态异构冗余结构的拟态防御自动机模型[J].电子学报,2019,47(10):2025-2031. [7] SOURAVLAS S,ANASTASIADOU S.Pipelined dynamic scheduling of big data streams[J].Applied Sciences,2020,10(14):4796-4802. [8] GAO Ming,LUO Jin,ZHOU Huiying.A differential feedback scheduling decision algorithm based on mimic defense[J].Telecommunications Science,2020,36(5):73-82.(in Chinese)高明,罗锦,周慧颖.一种基于拟态防御的差异化反馈调度判决算法[J].电信科学,2020,36(5):73-82. [9] PU Liming,LIU Shuxin,DING Ruihao.Heterogeneous executor scheduling algorithm for mimic cloud service[J].Journal on Communications,2020,41(3):17-24.(in Chinese)普黎明,刘树新,丁瑞浩.面向拟态云服务的异构执行体调度算法[J].通信学报,2020,41(3):17-24. [10] LEI Rui,LI Chuanhuang,TANG Zhongyun.Openflow table decision method under mimic defense[C]//Proceedings of the 4th International Conference on Data Mining,Communications and Information Technology.Xi'an,China:[s.n.],2020:1-8. [11] WEI Shuai,ZHANG Huihua,SU Ye.Majority voting algorithm and performance analysis based on high level heterogeneity[J/OL].Computer Engineering:1-7[2020-07-03].https://doi.org/10.19678/j.issn.1000-3428.0058718.(in Chinese)魏帅,张辉华,苏野.基于高阶异构度的大数裁决算法及性能分析[J/OL].计算机工程:1-7[2020-07-03].https://doi.org/10.19678/j.issn.1000-3428.0058718. [12] LI G S,WANG W,GAI K K,et al.A framework for mimic defense system in cyberspace[J].Journal of Signal Processing Systems,2021,93(2/3):169-185. [13] LI Qinyuan,HAN Jiajia,SUN Xin.Mimic defense system security analysis model[J].Journal of Physics:Conference Series,2019,1187(5):1-9. [14] YU Yanping,GUO Yuanbo,MA Jianfeng.Intrusion tolerant architecture with adaptive majority voting mechanism[J].Systems Engineering and Electronics,2005,27(6):1098-1101.(in Chinese)俞艳苹,郭渊博,马建峰.基于自适应大数表决机制的容忍入侵模型[J].系统工程与电子技术,2005,27(6):1098-1101. [15] TOTEL E,MAJORCZYK F,MÉ L.COTS diversity based intrusion detection and application to Web servers[C]//Proceedings of the 8th International Conference on Recent Advances in Intrusion Detection.New York,USA:ACM Press,2006:43-62. [16] PLATO A.What is an intrusion prevention system[EB/OL].[2020-07-03].http://www.anition.com/corp/papers/ips_defined.pdf. [17] OUYANG Chengtian,WANG Xi,ZHENG Jian.Adaptive consensus voting algorithm[J].Computer Science,2011,38(7):130-133.(in Chinese)欧阳城添,王曦,郑剑.自适应一致表决算法[J].计算机科学,2011,38(7):130-133. [18] ZHOU Haitao,ZHU Jihong.Majority voting algorithm based on self-test[J].Journal of Tsinghua University(Science and Technology),2005,45(4):488-491.(in Chinese)周海涛,朱纪洪.基于自检测的多数一致表决算法[J].清华大学学报(自然科学版),2005,45(4):488-491. [19] WU Zhaoqi,ZHANG Fan,GUO Wei,et al.A mimic ruling optimization method based on executive heterogeneity[J].Computer Engineering,2020,46(5):12-18.(in Chinese)武兆琪,张帆,郭威,等.一种基于执行体异构度的拟态裁决优化方法[J].计算机工程,2020,46(5):12-18. [20] LIN Senjie,LIU Qinrang,WANG Xiaolong.Competitive arbitration model for mimic defense system[J].Computer Engineering,2018,44(4):193-198.(in Chinese)林森杰,刘勤让,王孝龙.面向拟态防御系统的竞赛式仲裁模型[J].计算机工程,2018,44(4):193-198. [21] ZHU Bei,LI Jing,FANG Xiaorong,et al.LSC-TGT:an log parsing approach based on string clustering and template generating tree[J].Journal of Chinese Computer Systems,2020,41(8):1676-1683.(in Chinese)祝蓓,李静,方晓蓉,等.LSC-TGT:基于字符串聚类和模板生成树的在线日志解析方法[J].小型微型计算机系统,2020,41(8):1676-1683. [22] PENG Yuanhao,PAN Jiuhui.Study on incremental data capturing method based on log analysis[J].Computer Engineering,2015,41(6):56-60,65.(in Chinese)彭远浩,潘久辉.基于日志分析的增量数据捕获方法研究[J].计算机工程,2015,41(6):56-60,65. [23] TAN Sen,GUO Jie.MySQL database forensics algorithm based on log analysis[J].China Information Security and Communications Privacy,2015,13(3):81-84.(in Chinese)谭森,郭捷.基于日志分析的MySQL数据库取证算法[J].信息安全与通信保密,2015,13(3):81-84. [24] NAVARRO G,FREDRIKSSON K.Average complexity of exact and approximate multiple string matching[J].Theoretical Computer Science,2004,321(2):283-290. [25] PAN Guanhua,ZHANG Xingzhong.Study on efficiency of Sunday algorithm[J].Journal of Computer Applications,2012,32(11):3082-3084,3088.(in Chinese)潘冠桦,张兴忠.Sunday算法效率分析[J].计算机应用,2012,32(11):3082-3084,3088. [26] LI Li,JIANG Yu'e,LIN Jie,et al.Improved algorithm KMPP based on KMP[J].Computer Engineering and Applications,2016,52(8):33-37.(in Chinese)李莉,江育娥,林劼,等.基于KMP算法的改进算法KMPP[J].计算机工程与应用,2016,52(8):33-37. |