[1] 刘兰,任光明,林军.SDN环境下的动态随机网络病毒传播模型及特性研究[J].计算机工程,2018,44(8):179-183. [2] JAJODIA S,GHOSH A K,SWARUP V,et al.Moving target defense——creating asymmetric uncertainty for cyber threats[M].Berlin,Germany:Springer,2011. [3] 杨林,于全.动态赋能网络空间防御[M].北京:人民邮电出版社,2016. [4] 谷允捷,胡宇翔,丁悦航,等.基于业务感知的随机地址跳变方法[J].计算机工程,2018,44(10):28-33,41. [5] OKHRAVI H,COMELLA A,ROBINSON E,et al.Creating a cyber moving target for critical infrastructure applications using platform diversity[J].International Journal of Critical Infrastructure Protection,2012,3(1):30-39. [6] WEI Peng,LI Feng,HUANG C T,et al.A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces[C]//Proceedings of 2014 IEEE International Conference on Communications.Washington D.C.,USA:IEEE Press,2014:804-809. [7] HUANG Y,GHOSH A K.Introducing diversity and uncertainty to create moving attack surfaces for Web services[M].Berlin,Germany:Springer,2011. [8] BANGALORE A K,SOOD A K.Securing Web servers using self cleansing intrusion tolerance[C]//Proceedings of DEPEND'09.Washington D.C.,USA:IEEE Press,2009:60-65. [9] 赵鑫.跳变信息服务系统研究[J].软件,2018,39(3):204-208. [10] 刘江,张红旗,刘艺.基于不完全信息动态博弈的动态目标防御最优策略选取研究[J].电子学报,2018,46(1):82-89. [11] 刘丹军,蔡桂林,王宝生.AMTD:一种适应性动态目标防御方法[J].网络与信息安全学报,2018,4(1):1-12. [12] 顾泽宇,张兴明,林森杰.基于安全策略的负载感知动态调度机制[J].计算机应用,2017,37(11):3304-3310. [13] 雷程,马多贺,张红旗,等.基于网络攻击面自适应转换的动态目标防御技术[J].计算机学报,2018,41(5):1109-1131. [14] 刘江,张红旗,杨英杰,等.基于主机安全状态迁移模型的动态网络防御有效性评估[J].电子与信息学报,2017,39(3):509-517. [15] OKHRAVI H,RIOADAN J,CARTER K.Quantitative evaluation of dynamic platform techniques as a defensive mechanism[C]//Proceedings of the 17th International Symposium on Recent Advances in Intrusion Detection.Berlin,Germany:Springer,2014:405-425. [16] HONG J B,KIM D S.Assessing the effectiveness of moving target defenses using security models[J].IEEE Transactions on Dependable and Secure Computing,2016,13(2):163-177. [17] SHEYNE R O,HAINES J,JHA S,et al.Automated generation and analysis of attack graphs[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2002:273-284. [18] OKHRAVI H,RABE M,MAYBERR Y T,et al.Survey of cyber moving target techniques[D].Lexington,USA:Massachusetts Institute of Technology Lexington Lincoln Laboratory,2013. [19] CAI Gulin,WANG Baosheng,HU Wei,et al.Moving target defense:state of the art and characteristics[J].Frontiers of Information Technology and Electronic Engineering,2016,17(11):1122-1153. [20] 刘海燕,张钰,毕建权,等.基于分布式及协同式网络入侵检测技术综述[J].计算机工程与应用,2018,54(8):1-20. [21] NITRD Subcommittee.National cyber leap year summit 2009 co-chairs' report[EB/OL].[2018-12-21].https://www.nitrd.gov/nitrdgroups/index.php?title=Category:National_Cyber_Leap_Year_Summit_2009. |