[1] SIDDIQA A,KARIM A,GANI A.Big data storage technologies:a survey[J].Frontiers of Information Technology & Electronic Engineering,2017,18(8):1040-1070. [2] ARMIN J,FOTI P,CREMONINI M.0-day vulnerabilities and cybercrime[C]//Proceedings of the 10th International Conference on Availability,Reliability and Security.Washington D.C.,USA:IEEE Press,2015:711-718. [3] ZHANG Y,JUELS A,REITER M K,et al.Cross-tenant side-channel attacks in PaaS clouds[C]//Proceedings of 2014 ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2014:990-1003. [4] XIAO Zhifeng,XIAO Yang.Security and privacy in cloud computing[J].IEEE Communications Surveys & Tutorials,2013,15(2):843-859. [5] WU Jiangxing.Research on cyber mimic defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese)邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. [6] JAJODIA S,GHOSH A K,SWARUP V,et al.Moving target defense:creating asymmetric uncertainty for cyber threats[M].[S.l.]:Springer Science & Business Media,2011. [7] VOAS J,GHOSH A,CHARRON F,et al.Reducing uncertainty about common-mode failures[C]//Proceedings the 8th International Symposium on Software Reliability Engineering.Washington D.C.,USA:IEEE Press,1997:308-319. [8] TONG Qing,ZHANG Zheng,ZHANG Weihua,et al.Design and implementation of mimic defense Web server[J].Journal of Software,2017,28(4):883-897.(in Chinese)仝青,张铮,张为华,等.拟态防御Web服务器设计与实现[J].软件学报,2017,28(4):883-897. [9] MA Hailong,JIANG Yiming,BAI Bing,et al.Tests and analyses for mimic defense ability of routers[J].Journal of Cyber Security,2017,2(1):43-53.(in Chinese)马海龙,江逸茗,白冰,等.路由器拟态防御能力测试与分析[J].信息安全学报,2017,2(1):43-53. [10] QI Chao,WU Jiangxing,HU Hongchao,et al.An intensive security architecture with multi-controller for SDN[C]//Proceedings of 2016 IEEE Conference on Computer Communications Workshops.Washington D.C.,USA:IEEE Press,2016:401-402. [11] XU Mixue,YUAN Chao,WANG Yongjuan,et al.Mimic blockchain-solution to the security of blockchain[J].Journal of Software,2019,30(6):1681-1691.(in Chinese)徐蜜雪,苑超,王永娟,等.拟态区块链——区块链安全解决方案[J].软件学报,2019,30(6):1681-1691. [12] WEI Shuai,YU Hong,GU Zeyu,et al.Architecture of mimic security processor for industry control system[J].Journal of Cyber Security,2016,2(1):54-73.(in Chinese)魏帅,于洪,顾泽宇,等.面向工控领域的拟态安全处理机架构[J].信息安全学报,2016,2(1):54-73. [13] WANG Zhenpeng,HU Hongchao,CHENG Guozhen.A DNS architecture based on mimic security defense[J].Acta Electronica Sinica,2017,45(11):139-148.(in Chinese)王禛鹏,扈红超,程国振.一种基于拟态安全防御的DNS框架设计[J].电子学报,2017,45(11):139-148. [14] LIN Zhili,LI Kedan,HOU Hanxu,et al.MDFS:a mimic defense theory based architecture for distributed file system[C]//Proceedings of 2017 IEEE International Conference on Big Data.Washington D.C.,USA:IEEE Press,2017:2670-2675. [15] GHEMAWAT S,GOBIOFF H,LEUNG S T.The Google file system[C]//Proceedings of the 19th ACM Symposium on Operating Systems Principles.New York,USA:ACM Press,2003:20-43. [16] CHEN Yue,WANG Longjiang,YAN Xincheng,et al.Mimic storage scheme based on regenerated code[J].Journal on Communications,2018,39(4):21-34.(in Chinese)陈越,王龙江,严新成,等.基于再生码的拟态数据存储方案[J].通信学报,2018,39(4):21-34. [17] HU Hongchao,CHEN Fucai,WANG Zhenpeng.Performance evaluations on DHR for cyberspace mimic defense[J].Journal of Cyber Security,2016,1(4):40-51.(in Chinese)扈红超,陈福才,王禛鹏.拟态防御DHR模型若干问题探讨和性能评估[J].信息安全学报,2016,1(4):40-51. [18] SHVACHKO K,KUANG H,RADIA S,et al.The Hadoop distributed file system[C]//Proceedings of MSST'10.Washington D.C.,USA:IEEE Computer Society,2010:1-10. [19] SPIVEY B,ECHEVERRIA J.Hadoop security:protecting your big data platform[M].[S.l.]:O'Reilly Media,Inc.,2015. [20] MOHSIN M,ANWAR Z.Where to kill the cyber kill-chain:an ontology-driven framework for iot security analytics[C]//Proceedings of 2016 International Conference on Frontiers of Information Technology.Washington D.C.,USA:IEEE Press,2016:23-28. |