[1]JAJODIA S,GHOSH A K,SWARUP V,et al.Moving target defense:creating asymmetric uncertainty for cyber threats[M].Berlin,Germany:Springer,2011.
[2]ANTONATOS S,AKRITIDIS P,MARKATOS E P,et al.Defending against hitlist worms using network address space randomization[C]//Proceedings of ACM Workshop on Rapid Malcode.New York,USA:ACM Press,2005:30-40.
[3]AZODOLMOLKY S.Software defined networking with OpenFlow[M].Birmingham,UK:Packt Publishing,2013.
[4]ATIGHETCHI M,PAL P,WEBBER F,et al.Adaptive use of network-centric mechanisms in cyber-defense[C]//Proceedings of IEEE International Symposium on Object-oriented Real-time Distributed Computing.Washington D.C.,USA:IEEE Press,2003:183-192.
[5]KEWLEY D,FINK R,LOWRY J,et al.Dynamic approaches to thwart adversary intelligence gathering[C]//Proceedings of DISCEX’01.Washington D.C.,USA:IEEE Press,2001:176-185.
[6]ANTONATOS S,AKRITIDIS P,MARKATOS E P,et al.Defending against hitlist worms using network address space randomization[J].Microcomputer Information,2009,51(12):3471-3490.
[7]JAFARIAN J H,AL-SHAER E,DUAN Q.An effective address mutation approach for disrupting reconnaissance attacks[J].IEEE Transactions on Information Forensics and Security,2015,10(12):2562-2577.
[8]JAFARIAN J H,AL-SHAER E,DUAN Q.Openflow random host mutation:transparent moving target defense using software defined networking[C]//Proceedings of Workshop on Hot Topics in Software Defined Networks.New York,USA:ACM Press,2012:127-132.
[9]ZHENG K,ZHAO X,LI X,et al.A SDN-based IP address hopping method design[C]//Proceedings of International Conference on Measurement,Instrumentation and Automation.Washington D.C.,USA:IEEE Press,2016:509-512.
[10]张连成,魏强,唐秀存,等.基于路径与端址跳变的SDN网络主动防御技术[J].计算机研究与发展,2017,54(12):2748-2758.
[11]WU J.An effective architecture and algorithm for detecting worms with various scan techniques[C]//Proceedings of ISOC Symposium on Network and Distributed System Security.Washington D.C.,USA:IEEE Press,2004:143-156.
[12]JAFARIAN J H,AL-SHAER E,DUAN Q.Adversary-aware IP address randomization for proactive agility against sophisticated attackers[C]//Proceedings of 2015 IEEE Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2015:738-746.
[13]王宇航.一种基于SDN的地址跳变主动防御技术的研究与实现[D].杭州:浙江大学,2017.
[14]ABDULLAH T.Testing of Floodlight controller with Mininet in SDN topology[J].Sciencerise,2014,5(2):158.
[15]OLIVEIRA R L S D,SHINODA A A,SCHWEITZER C M,et al.Using Mininet for emulation and prototyping software-defined networks[C]//Proceedings of 2014 IEEE Colombian Conference on Communications and Com-puting.Washington D.C.,USA:IEEE Press,2014:1-6.
[16]OREBAUGH A,SARAMIREZ G,BURKE J,et al.Wireshark and Ethereal network protocol analyzer toolkit[M].[S.l.]:Syngress Publishing,2007:523-540.
[17]MCKEOWN N,ANDERSON T,BALAKRISHNAN H,et al.OpenFlow:enabling innovation in campus networks[J].ACM SIGCOMM Computer Communication Review,2008,38(2):69-74.
[18]林森杰,刘勤让,王孝龙.面向拟态防御系统的竞赛式仲裁模型[J].计算机工程,2018,44(4):193-198.
|