[1]ROSS R.Managing information security risk:organization,mission and information system view[EB/OL].[2017-06-30].https://ws680.nist.gov/publication/get_pdf.cfm?pub_id=908030.br/
[2]AUTY M.Anatomy of an advanced persistent threat[J].Network Security,2015(4):13-16.br/
[3]胡彬,王春东,胡思琦,等.基于机器学习的移动终端高级持续性威胁检测技术研究[J].计算机工程,2017,43(1):241-246.br/
[4]KAUR R,SINGH M.A survey on zero-day polymorphic worm detection techniques[J].IEEE Communications Surveys and Tutorials,2014,16(3):1520-1549.br/
[5]潘道欣,王轶骏,薛质.基于网络协议逆向分析的远程控制木马漏洞挖掘[J].计算机工程,2016,42(2):146-150.br/
[6]张小松,牛伟纳,杨国武,等.基于树型结构的APT攻击预测方法[J].电子科技大学学报,2016,45(4):582-588.br/
[7]HONG J B,KIM D S.Assessing the effectiveness of moving target defenses using security models[J].IEEE Transactions on Dependable and Secure Computing,2016,13(2):163-177.br/
[8]DOHERTY S,BANERJEE D.Orchestrating software defined networks(SDN) to disrupt the APT kill chain[EB/OL].[2017-06-30].https://www.rsaconference. com/events/us15/agenda/sessions/1555/orchestrating-software-defined-networks-sdn-to.br/
[9]LI M,HUANG W,WANG Y,et al.The study of APT attack stage model[C]//Proceedings of 2016 IEEE/ACIS International Conference on Computer and Information Science.Washington D.C.,USA:IEEE Press,2016:1-5.br/
[10]BREWER R.Advanced persistent threats:minimising the damage[J].Network Security,2014(4):5-9.br/
[11]CHOI J,CHOI C,LYNN H M,et al.Ontology based APT attack behavior analysis in cloud computing[C]//Proceedings of the 10th International Conference on Broadband and Wireless Computing,Communication and Applications.Washington D.C.,USA:IEEE Press,2015:375-379.br/
[12]IOANNOU G,LOUVIERIS P,CLEWLEY N,et al.A Markov multi-phase transferable belief model:an application for predicting data exfiltration APTs[C]//Proceedings of International Conference on Information Fusion.Washington D.C.,USA:IEEE
Press,2013:842-849.br/
[13]KOCH R,GOLLING M,RODOSEK G D.How anonymous is the tor network?a long-term black-box investigation[J].Computer,2016,49(3):42-49.br/
[14]GEHL R W.Power/freedom on the dark Web:a digital ethnography of the dark Web social network[J].New Media and Society,2016,18(7):1219-1235.br/
[15]胡飞,范建华,魏祥麟,等.基于节点状态跳转统计分析的干扰攻击检测算法[J].计算机工程,2017,43(7):156-162.br/
[16]GReAT.The DUQU 2.0 Technical Details[R].Moscow,Russia:Kaspersky Lab,2015.br/ |