Computer Science ›› 2020, Vol. 47 ›› Issue (12): 304-310.doi: 10.11896/jsjkx.200900126
Previous Articles Next Articles
ZHAO Jin-long1, ZHANG Guo-min1, XING Chang-you1, SONG Li-hua1, ZONG Yi-ben2
CLC Number:
[1] PANJWANI S,TAN S,JARRIN K M,et al.An experimentalevaluation to determine if port scans are precursors to an attack[C]//2005 International Conference on Dependable Systems and Networks (DSN'05).IEEE,2005:602-611. [2] WANG L,WU D.Moving target defense against network reconnaissance with software defined networking[C]//International Conference on Information Security.Springer,2016:203-217. [3] SOOD A K,ENBODY R J.Targeted cyberattacks:A superset of advanced persistent threats[J].IEEE Security &Privacy,2013,11(1):54-61. [4] CHIANG C-Y J,GOTTLIEB Y M,SUGRIM S J,et al.Acyds:An adaptive cyber deception system[C]//2016 IEEE Military Communications Conference.IEEE,2016:800-805. [5] XU M,GAO Y,FENG C.Dds:A distributed deception defense system based on sdn[C]//2018 14th International Conference on Computational Intelligence and Security (CIS).IEEE,2018:430-433. [6] KELLY J,DELAUS M,HEMBERG E,et al.Adversariallyadapting deceptive views and reconnaissance scans on a software defined network[C]//2019 IFIP/IEEE Symposium on Integra-ted Network and Service Management (IM).IEEE,2019:49-54. [7] ACHLEITNER S,LA PORTA T F,MCDANIEL P,et al.Deceiving network reconnaissance using sdn-based virtual topologies[J].Ieee Transactions on Network and Service Management,2017,14(4):1098-1112. [8] ROBERTSON S,ALEXANDER S,MICALLEF J,et al.Cin-dam:Customized information networks for deception and attack mitigation[C]//IEEE International Conference on Self-adaptive &Self-organizing Systems Workshops.IEEE,2015:114-119. [9] Cyberchaff[EB/OL].(2020-8-14)[2020-8-14].https://formal.tech/cyberchaff/. [10] JAFARIAN J H,AL-SHAER E,DUAN Q.Openflow random host mutation:Transparent moving target defense using software defined networking[C]//Proceedings of the First Workshop on Hot Topics in Software Defined Networks.ACM,2012:127-132. [11] DU J,GUAN H S,JIANG B C.Defending against hitlist worms using network address space randomization[J].Microcomputer Information,2009(6):85-87. [12] JAFARIAN J H,AL-SHAER E,DUAN Q.An effective address mutation approach for disrupting reconnaissance attacks[J].IEEE Trans Information Forensics and Security,2015,10(12):2562-2577. [13] JAFARIAN J H,AL-SHAER E,DUAN Q.Adversary-aware ip address randomization for proactive agility against sophisticated attackers[C]//2015 IEEE Conference on Computer Communications (INFOCOM).IEEE,2015:738-746. [14] CLARK A,SUN K,POOVENDRAN R.Effectiveness of ip address randomization in decoy-based moving target defense[C]//Decision &Control.IEEE,2013:678-685. [15] MACFARLAND D C,SHUE C A.The sdn shuffle:Creating a moving-target defense using host-based software-defined networking[C]//Proceedings of the Second ACM Workshop on Moving Target Defense.ACM,2015:37-41. [16] ANTONATOS S,AKRITIDIS P,MARKATOS E P,et al.Defending against hitlist worms using network address space randomization[J].Computer Networks,2007,51(12):3471-3490. [17] YACKOSKI J,XIE P,BULLEN H,et al.A self-shielding dy-namic network architecture[C]//Military Communications Conference.IEEE,2011:1381-1386. [18] XING J,YANG M,ZHOU H,et al.Hiding and trapping:A deceptive approach for defending against network reconnaissance with software-defined network[C]//2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC),London,United Kingdom.IEEE,2019:1-8. [19] ZOU C C,TOWSLEY D,GONG W B.On the performance of internet worm scanning strategies[J].Performance Evaluation,2006,63(7):700-723. [20] WANG S,ZHOU Y,LI Y,et al.Quantitative analysis of network address randomization's security effectiveness[C]//2018 IEEE 18th International Conference on Communication Technology (ICCT).IEEE,2018. [21] STAFFORD S,LI J.Behavior-based worm detectors compared[C]//Recent Advances in Intrusion Detection.International Symposium,Raid,Ottawa,Ontario,Canada.DBLP,2013. [22] LI Y,CHEN Z,CHEN C.Understanding divide-conquer-scanning worms[C]//2008 IEEE International Performance,Computing and Communications Conference.IEEE,2008:51-58. |
[1] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[2] | GAO Chun-gang, WANG Yong-jie, XIONG Xin-li. MTDCD:A Hybrid Defense Mechanism Against Network Intrusion [J]. Computer Science, 2022, 49(7): 324-331. |
[3] | LI Shao-hui, ZHANG Guo-min, SONG Li-hua, WANG Xiu-lei. Incomplete Information Game Theoretic Analysis to Defend Fingerprinting [J]. Computer Science, 2021, 48(8): 291-299. |
[4] | LIU Ya-qun, XING Chang-you, GAO Ya-zhuo, ZHANG Guo-min. TopoObfu:A Network Topology Obfuscation Mechanism to Defense Network Reconnaissance [J]. Computer Science, 2021, 48(10): 278-285. |
[5] | ZHOU Jian-xin, ZHANG Zhi-peng, ZHOU Ning. Load Balancing Technology of Segment Routing Based on CKSP [J]. Computer Science, 2020, 47(4): 256-261. |
[6] | ZHANG Zhao, LI Hai-long, HU Lei, DONG Si-qi. Service Function Load Balancing Based on SDN-SFC [J]. Computer Science, 2019, 46(9): 130-136. |
[7] | ZHANG Fang, DENG Chang-lin, WANG Zhi and GUO Wei. Link Failure Detection and Fast Recovery in Software-defined Satellite Network [J]. Computer Science, 2017, 44(6): 63-67. |
[8] | LIU Lin and ZHOU Jian-tao. Review for Research of Control Plane in Software-defined Network [J]. Computer Science, 2017, 44(2): 75-81. |
[9] | SHEN Pu-bing, ZHAO Zhan-dong and GONG Qiang-bing. Research on Evaluation of Computer Network Operation Based on Capacity Factor [J]. Computer Science, 2016, 43(Z6): 505-507. |
|