[1] ZHENG J J,NAMIN A S.A survey on the moving target defense strategies:an architectural perspective[J].Journal of Computer Science and Technology,2019,34(1):207-233. [2] JAFARIAN J H,AL-SHAER E,DUAN Q.OpenFlow random host mutation:transparent moving target defense using software defined networking[C]//Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks.New York,USA:ACM Press,2012:127-132. [3] JAFARIAN J H,AL-SHAER E,DUAN Q.An effective address mutation approach for disrupting reconnaissance attacks[J].IEEE Transactions on Information Forensics and Security,2015,10(12):2562-2577. [4] JAFARIAN J H,AL-SHAER E,DUAN Q.Adversary-aware IP address randomization for proactive agility against sophisticated attackers[C]//Proceedings of 2015 IEEE Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2015:738-746. [5] LUO Yuebin,WANG Baosheng,CAI Guilin.Effectiveness of port hopping as a moving target defense[C]//Proceedings of the 7th International Conference on Security Technology.Washington D.C.,USA:IEEE Press,2014:7-10. [6] AZAB M,ELTOWEISSY M.ChameleonSoft:software behavior encryption for moving target defense[J].Mobile Networks & Applications,2013,18(2):271-292. [7] CHIANG M L,HSIEH H C,WANG C W.Improving the fault-tolerance under software-defined network based on new sight of agreement protocol[J].IEEE Access,2018,6:40898-40908. [8] SAKIC E,DERIC N,KELLERER W.MORPH:an adaptive framework for efficient and Byzantine fault-tolerant SDN control plane[J].IEEE Journal on Selected Areas in Communications,2018,36(10):2158-2174. [9] YUAN Bin,JIN Hai,ZOU Deqing,et al.A practical Byzantine-based approach for faulty switch tolerance in software-defined networks[J].IEEE Transactions on Network and Service Management,2018,15(2):825-839. [10] HU Hongcha,WU Jiangxing,WANG Zhenpeng,et al.Mimic defense:a designed-in cybersecurity defense framework[J].IET Information Security,2017,12(3):226-237. [11] WU Jiangxing.Construction of endogenous security in national information network space with mimic defense technology[J].Information and Communication Security,2019,13(6):4-6.(in Chinese)邬江兴.拟态防御技术构建国家信息网络空间内生安全[J].信息通信技术,2019,13(6):4-6. [12] WU Jiangxing.Research on cyber mimic defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese)邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. [13] HU Hongchao,WANG Zhenpeng,CHENG Guozhen.MNOS:a mimic network operating system for software defined networks[J].IET Information Security,2017,11(6):345-355. [14] MA Hailong,JIANG Yiming,BAI Bin,et al.Tests and analyses for mimic defense ability of routers[J].Journal of Cyber Security,2017,2(1):43-53.(in Chinese). 马海龙,江逸茗,白冰,等.路由器拟态防御能力测试与分析[J].信息安全学报,2017,2(1):43-53. [15] WEI Shuai,YU Hong,GU Zeyu,et al.Architecture of mimic security processor for industry control system[J].Journal of Cyber Security,2017,2(1):54-73.(in Chinese)魏帅,于洪,顾泽宇,等.面向工控领域的拟态安全处理机架构[J].信息安全学报,2017,2(1):54-73. [16] WU Jiangxing.Meaning and vision of mimic computing and mimic security defense[J].Telecommunications Science,2014,30(7):2-7.(in Chinese)邬江兴.拟态计算与拟态安全防御的原意和愿景[J].电信科学,2014,30(7):2-7. [17] SHEN Conglin,CHEN Shuangxi,WU Chunming,et al.Adaptive mimic defensive controller framework based on reputation and dissimilarity[J].Journal of Communications,2018,39(S2):173-180.(in Chinese)沈丛麒,陈双喜,吴春明,等.基于信誉度与相异度的自适应拟态控制器研究[J].通信学报,2018,39(S2):173-180. [18] YAO Wenbin,YANG Xiaozong.Design of selective algorithm for diverse software components[J].Journal of Harbin Institute of Technology,2003,35(3):261-264.(in Chinese)姚文斌,杨孝宗.相异性软件组件选择算法设计[J].哈尔滨工业大学学报,2003,35(3):261-264. [19] LIU Qinrang,LIN Senjie,GU Zeyu.Heterogeneous redundancies scheduling algorithm for mimic security defense[J].Journal of Communications,2018,39(7):188-198.(in Chinese)刘勤让,林森杰,顾泽宇.面向拟态安全防御的异构功能等价体调度算法[J].通信学报,2018,39(7):188-198. [20] ZHANG Jiexin,PANG Jianmin,ZHANG Zheng.Quantification method for heterogeneity on Web server with mimic construction[J].Journal of Software,2020,31(2):564-577.(in Chinese)张杰鑫,庞建民,张铮.拟态构造的Web服务器异构性量化方法[J].软件学报,2020,31(2):564-577. [21] WU Zhaoqi,ZHANG Fan,GUO Wei,et al.A mimic arbitration optimization method based on heterogeneous degree of executors[J].Computer Engineering,2020,46(5):12-18.(in Chinese)武兆琪,张帆,郭威,等.一种基于执行体异构度的拟态裁决优化方法[J].计算机工程,2020,46(5):12-18. |