[1] 龙子夜, 李军, 张杰."棱镜门"事件回顾与思考[J].计算机工程与应用, 2015, 51(S1):392-444. LONG Z Y, LI J, ZHANG J.Review and reflection on the "Prism Gate" incident[J].Computer Engineering and Applications, 2015, 51(S1):392-444.(in Chinese) [2] OPPLIGER R.Internet security:firewalls and beyond[J].Communications of the ACM, 1997, 40(5):92-102. [3] MANCINI L V, PIETRO R.Intrusion detection systems[M].Berlin, Germany:Springer, 2008. [4] PANDA B K, PRADHAN M, PRADHAN S K.Intrusion prevention system[EB/OL].[2021-01-05].https://www.geeksforgeeks.org/intrusion-prevention-system-ips/. [5] 斯雪明, 王伟, 曾俊杰, 等.拟态防御基础理论研究综述[J].中国工程科学, 2016, 18(6):62-68. SI X M, WANG W, ZENG J J, et al.A review of the basic theories of mimic defense[J].Strategic Study of CAE, 2016, 18(6):62-68.(in Chinese) [6] 邬江兴.网络空间拟态防御研究[J].信息安全学报, 2016, 1(4):1-10. WU J X.Research on cyber mimic defense[J].Journal of Cyber Security, 2016, 1(4):1-10.(in Chinese) [7] 邬江兴.内生安全:重新定义新基建的安全属性[J].中国科技产业, 2020(5):7-9. WU J X.Endogenous security:redefining the security attributes of new infrastructure[J].Science & Technology Industry of China, 2020(5):7-9.(in Chinese) [8] 郭威, 谢光伟, 张帆, 等.一种分布式存储系统拟态化架构设计与实现[J].计算机工程, 2020, 46(6):12-19. GUO W, XIE G W, ZHANG F, et al.Design and implementation of a mimic architecture for distributed storage system[J].Computer Engineering, 2020, 46(6):12-19.(in Chinese) [9] 郭威.分布式存储系统拟态化架构与关键技术研究[D].郑州:战略支援部队信息工程大学, 2019. GUO W.Research on the mimicking architecture and key technologies of distributed storage system[D].Zhengzhou:PLA Strategic Support Force Information Engineering University, 2019.(in Chinese) [10] 魏帅, 于洪, 顾泽宇, 等.面向工控领域的拟态安全处理机架构[J].信息安全学报, 2017, 2(1):54-73. WEI S, YU H, GU Z Y, et al.Architecture of mimic security processor for industry control system[J].Journal of Cyber Security, 2017, 2(1):54-73.(in Chinese) [11] 马海龙, 伊鹏, 江逸茗, 等.基于动态异构冗余机制的路由器拟态防御体系结构[J].信息安全学报, 2017, 2(1):29-42. MA H L, YI P, JIANG Y M, et al.Dynamic heterogeneous redundancy based router architecture with mimic defenses[J].Journal of Cyber Security, 2017, 2(1):29-42.(in Chinese) [12] 王禛鹏, 扈红超, 程国振.一种基于拟态安全防御的DNS框架设计[J].电子学报, 2017, 45(11):2705-2714. WANG Z P, HU H C, CHENG G Z.A DNS architecture based on mimic security defense[J].Acta Electronica Sinica, 2017, 45(11):2705-2714.(in Chinese) [13] QI C, WU J, CHENG G, et al.An aware-scheduling security architecture with priority-equal multi-controller for SDN[J].China Communications, 2017, 14(9):144-154. [14] LI J, WU J, HU Y, et al.DSL:dynamic and self-learning schedule method of multiple controllers in SDN[J].ETRI Journal, 2017, 39(3):364-372. [15] PU L M, WU J X, MA H L, et al.MimicCloudSim:an environment for modeling and simulation of mimic cloud service[J].China Communications, 2021, 18(1):212-221. [16] 邬江兴.网络空间拟态安全防御[J].保密科学技术, 2014(10):4-9. WU J X.Mimetic security defense in cyberspace[J].Security Science and Technology, 2014(10):4-9.(in Chinese) [17] 李丹, 叶廷东."异地多活"分布式存储系统设计和实现[J].计算机测量与控制, 2020, 28(4):211-216. LI D, YE T D.Design and implementation of a "multi-active across data centers" distributed storage system[J].Computer Measurement & Control, 2020, 28(4):211-216.(in Chinese) [18] 何俊杰.基于最终一致性的HDFS读写技术的研究与优化[D].上海:上海交通大学, 2016. HE J J.Research and optimization of HDFS read-write technology based on eventual consistency[D].Shanghai:Shanghai Jiaotong University, 2016.(in Chinese) [19] 杨成荣, 刘峻松, 孙新杰, 等.基于微服务架构的数据一致性方法研究[J].电脑知识与技术, 2020, 16(8):266-268. YANG C R, LIU J S, SUN X J, et al.Research on data consistency method based on microservice architecture[J].Computer Knowledge and Technology, 2020, 16(8):266-268.(in Chinese) [20] 李岩, 唐真.一种高并发下最终一致性算法及实现[J].网络安全技术与应用, 2020(7):47-49. LI Y, TANG Z.A final consensus algorithm and its implementation under high concurrency[J].Network Security Technology and Application, 2020(7):47-49.(in Chinese) [21] 钟将, 杨雷.面向海量新闻数据的HDFS节能存储策略[J].计算机工程, 2015, 41(12):48-53. ZHONG J, YANG L.HDFS energy-saving storage strategy for massive news data[J].Computer Engineering, 2015, 41(12):48-53.(in Chinese) [22] SHVACHKO K, KUANG H, RADIA S, et al.The hadoop distributed file system[EB/OL].[2021-01-05].https://storageconference.us/2010/Papers/MSST/Shvachko.pdf. |