Computer Science ›› 2024, Vol. 51 ›› Issue (11A): 231100132-13.doi: 10.11896/jsjkx.231100132
• Information Security • Previous Articles Next Articles
HU Hongchao, SUI Jiaqi, ZHANG Shuai, TONG Yu
CLC Number:
[1]ZHENG Y,LI Z,XU X,et al.Dynamic defenses in cyber Securi-ty:Techniques,methods and challenges[J].Digital Communications and Networks,2022,8:422-435. [2]CHO J H,SHARMA D P,ALAVIZADEH H,et al.TowardProactive,Adaptive Defense:A Survey on Moving Target Defense[J].IEEE Communications Surveys & Tutorials,2020,22(1):709-745. [3]FRAUNHOLZ D,ANTON S D,LIPPS C,et al.Demystifying deception technology:A survey[J].arXiv:1804.06196,2018. [4]SI M X,WANG W,ZENG J J,et al.A Review of the Basic Theory of Mimic Defense[J].Strategic Study of CAE,2016,18(6):62-68. [5]YAO D,ZHANG Z,ZHANG G F,et al.A Survey on Multi-Variant Execution Security Defense Technology[J].Journal of Cyber Security,2020,5(5):77-94. [6]ZHOU Y Y,CHENG G,GUO C S,et al.Survey onAttack Surface Dynamic Transfer Technology Based on Moving Target Defense[J].Journal of Software,2018,29(9):2799-2820. [7]CAI G L,WANG B S,WANG T Z,et al.Research and Development of Moving Target Defense Technology[J].Journal of Computer Research and Development,2016,53(5):968-987. [8]FAN L N,MA Y F,HUANG H,et al.The Research Summaryof Moving Target Defense Technology[J].Journal of CAEIT,2017,12(2):209-214. [9]JALOWSKIL,ZMUDA M,RAWSKI M.A Survey on Moving Target Defense for Networks:A Practical View[J].Electronics,2022,11. [10]SENGUPTA S,CHOWDHARY A,SABUR A,et al.A Surveyof Moving Target Defenses for Network Security[J].IEEE Communications Surveys & Tutorials,2020,22(3):1909-1941. [11]TAN J L,JIN H,ZHANG H Q,et al.A survey:When moving target defense meets game theory[J].Computer Science Review,2023,48. [12]LU Z,WANG C,ZHAO S Q.Cyber deception for computer and network security:Survey and challenges[J].arXiv:2007.14497,2020. [13]URIAS V E,STOUT W M S,LUC-WATSON J,et al.Technolo-gies to enable cyber deception[C]//2017 International Carnahan Conference on Security Technology(ICCST).IEEE,2017:1-6. [14]LIEBOWITZ D,NEPAL S,MOORE K,et al.Deception for cyber defence:challenges and opportunities[C]//2021 Third IEEE International Conference on Trust,Privacy and Security in Intelligent Systems and Applications(TPS-ISA).IEEE,2021:173-182. [15]WANG C,LU Z.Cyber deception:Overview and the road ahead[J].IEEE Security & Privacy,2018,16(2):80-85. [16]RAUTI S,LEPPÄNEN V.A survey on fake entities as a methodto detect and monitor malicious activity[C]//2017 25th Euromicro international conference on Parallel,Distributed and Network-based Processing(PDP).IEEE,2017:386-390. [17]ZHANG L,THING V L L.Three decades of deception tech-niques in active cyber defense-retrospect and outlook[J].Computers & Security,2021,106:102288. [18]JIA Z P,FANG B X,LIU C G,et al.Survey on cyber deception[J].Journal on Communications,2017,38(12):128-143. [19]GAO Y Z,LIU Y Q,XING C Y,et al.Research on Network Deception Defense Oriented Attack Trapping Technology[J].Computer Technology and Development,2022,32(3):114-119. [20]ZHU M,ANWAR A H,WAN Z,et al.Game-theoretic and machine learning-based approaches for defensive deception:A survey[J].arXiv:2101.10121,2021. [21]ZHU M,ANWAR A H,WAN Z,et al.A survey of defensive deception:Approaches using game theory and machine learning[J].IEEE Communications Surveys & Tutorials,2021,23(4):2460-2493. [22]LI G S,WANG W,GAI K,et al.A framework for mimic defense system in cyberspace[J].Journal of Signal Processing Systems,2021,93:169-185. [23]MA B,ZHANG Z.Security research of redundancy in mimic defense system[C]//2017 3rd IEEE International Conference on Computer and Communications(ICCC).IEEE,2017:2910-2914. [24]WU J X.Research on Cyber Mimic Defense[J].Journal of Cyber Security,2016,1(4):1-10. [25]WU J X.Meaning and Vision of Mimic Computing and Mimic Security Defense[J].Telecommunications Science,2014,30(7):2-7. [26]MA H L,YI P,JIANG Y M,et al.Dynamic Heterogeneous Re-dundancy based Router Architecture with Mimic Defenses[J].Journal of Cyber Security,2017,2(1):29-42. [27]HU H C,CHEN F C,WANG Z P.Performance Evaluations on DHR for Cyberspace Mimic Defense[J].Journal of Cyber Securi-ty,2016,1(4):40-51. [28]GUDLA C,SUNG A H.Moving Target Defense Discrete Host Address Mutation and Analysis in SDN[C]//International Conference on Computational Science and Computational Intelligence.2020:16-18. [29]DUNLOP M,GROAT S,URBANSKI W,et al.MT6D:A Moving Target IPv6 Defense[C]//MILCOM 2011 Military Communications Conference.2011. [30]NAVAS R E,SANDAKE H,FREDERIC C,et al.IANVS:A Moving Target Defense Framework for a Resilient Internet of Things[C]//2020 IEEE Symposium on Computers and Communications(ISCC).2020. [31]MACFARLAND D,SHUE C.The SDN Shuffle:Creating aMoving-Target Defense using Host-based Software-Defined Networking[C]//ACM Workshop on Moving Target Defense.2015:37-41. [32]LUO Y B,WANG B S,WANG X F,et al.RPAH:Random Port and Address Hopping for Thwarting Internal and External Adversaries[C]//2015 IEEE Trustcom/BigDataSE/ISPA.2015:20-22. [33]AYDEGER A,SAPUTRO N,AKKAYA K,et al.MitigatingCrossfire Attacks Using SDN-Based Moving Target Defense[C]//2016 IEEE 41st Conference on Local Computer Networks(LCN).2016. [34]ZHANG B F.Research on Moving Target Defense Based onNetwork Layer in SDN [D].Tianjin:Tianjin University of Technology,2022. [35]RAWSKI M.Network Topology Mutation as Moving TargetDefense for Corporate Networks[J].INTL Journal of Electroni-cs and Telecommunications,2019:571-577. [36]BAI S H,ZHANG Z,LIU S X.Proactive Defense Method Based on False Network Topology Hopping[J].Journal of Information Engineering University,2022,23(3):337-343. [37]AZAB M,MOKHTAR B,ABED A,et al.Toward Smart Moving Target Defense for Linux Container Resiliency[C]//2016 IEEE 41st Conference on Local Computer Networks(LCN).2016. [38]HUANG R,ZHANG H Q,LIU Y.RELOCATE:A ContainerBased Moving Target Defense Approach[C]//CENet 2017-the 7th International Conference on Computer Engineering and Networks.2017. [39]PENNER T,GUIRGUIS M.Combating the Bandits in theCloud:A Moving Target Defense Approach[C]//ACM International Symposium on Cluster,Cloud and Grid Computing.2017. [40]DEBROY S,CALYAM P,NGUYEN M,et al.Frequency-minimal moving target defense using software-defined networking[C]//International Conference on Computing.2016. [41]ZHANG Y P,CHANG X L,MIŠIĆ J J,et al.Cost-effective migration-based dynamic platform defense technique:a CTMDP approach[J].Networking and Applications,2021,14:1207-1217. [42]SOUROUR D,CHEN T R,FENG Y,et al.Platform MovingTarget Defense Strategy Based on Trusted Dynamic Logical Heterogeneity System[C]//International Conference on Artificial Intelligence and Computer Science.2019. [43]KONG T,WANG L M,MA D H,et al.ConfigRand:A Moving Target Defense Framework against the Shared Kernel Information Leakages for Container-based Cloud[C]//International Conference on High Performance Computing and Communications;International Conference on Smart City.IEEE International Conference on Data Science and Systems,2020. [44]LUCAS B,FULP E W,JOHN D J,et al.An Initial Frameworkfor Evolving Computer Configurations as a Moving Target Defense[C]//Cyber and Information Security Research Confe-rence.2014. [45]SENGUPTA S,VADLAMUDI S G,KAMBHAMPATI S,et al.A Game Theoretic Approach to Strategy Generation for Moving Target Defense in Web Applications[C]//16th Conference on Autonomous Agents and MultiAgent Systems.2017:178-186. [46]NIAKANLAHIJI A,JAFARIAN J.WebMTD:Defeating WebCode Injection Attacks using Web Element Attribute Mutation[C]//4th ACM Workshop on Moving Target Defense.2017:17-26. [47]CADAR C,AKRITIDIS P,COSTA M,et al.Data Randomiz-ation:Technical Report:TR-2008-120[R].Microsoft Research,2008. [48]MAN Y J,YIN Q,ZHU X D.Fine-grained data randomization technique based on field-sensitive pointer analysis[J].Journal of Computer Applications,2016,36(6):1567-1572. [49]CRANE S,LIEBCHEN C,HOMESCU A,et al.Readactor:Practical Code Randomization Resilient to Memory Disclosure[C]//IEEE Symposium on Security and Privacy.2015. [50]PAPPAS V,POLYCHRONAKIS M,KEROMYTIS A D.Smashing the Gadgets:Hindering Return-Oriented Programming Using In-Place Code Randomization[C]//IEEE Sympo-sium on Security and Privacy.2012. [51]KC G S,KEROMYTIS A D,PREVELAKIS V.CounteringCode-InjectionAttacks With Instruction-Set Randomization[C]//ACM Conference on Computer and Communications Security.2003:272-280. [52]FU J M,ZHANG X,LIN Y.An Instruction-Set Randomization Using Length-Preserving Permutation[C]//IEEE Trustcom/BigDataSE/ISPA.2015. [53]SEO J,LEE B,KIM S M,et al.SGX-Shield:Enabling Address Space Layout Randomization for SGX Programs[C]//Network and Distributed System Security Symposium.2017. [54]VANO-GARCIA F,MARCO-GISBERT H.KASLR-MT:Ker-nel Address Space Layout Randomization for Multi-Tenant Cloud Systems[J].Journal of Parallel and Distributed Computing,2019,137:77-90. [55]JIANG L.Research on Moving Target Defense Decision-makingMethod Based on Dynamic Attack-defense Game Model [D].Zhengzhou:PLA Strategic Support Force Information Engineering University,2019. [56]CHEN Y,WANG G C.Research on Defense Decision Optimization of Moving Target Markov Signaling Game[J].Journal of Chinese Computer Systems,2023,44(2):392-400. [57]LEI C,MA D H,ZHANG H Q.Optimal Strategy Selection for Moving Target Defense Based on Markov Game[J].IEEE Access,2017,5:156-169. [58]HUANG S R,ZHANG H W,WANG J D,et al.Network securi-ty threat warning method based on qualitative differential game[J].Journal on Communications,2018,39(8):29-36. [59]MANADHATAP K.Game Theoretic Approaches to AttackSurface Shifting[M]//Moving Target Defense II:Appication of Game Theory and Adversarial Modeling.New York:Springer,2012:1-13 [60]LIU D Q,HU H C,HUO S M.Container migration strategy based on moving target defense signaling game[J].Application Research of Computers,2023,40(3):890-897. [61]SUN Y,JI W F,WENG J,et al.Optimal Strategy of MovingTarget Defense Based on Differential Game[J].Journal of Computer Research and Development,2021,58(8):1789-1800. [62]GAOC G,WANG Y J.Reinforcement learning based self-adaptive moving target defense against DDoS attacks[C]//International Conference on Electronics,Communications and Information Technology(CECIT).2020:26-28. [63]CHAI X Z,WANG Y S,YAN C X,et al.DQ-MOTAG:DeepReinforcement Learning-based Moving Target Defense Against DDoS Attacks[C]//2020 IEEE Fifth International Conference on Data Science in Cyberspace(DSC),2020. [64]ZHANG W,XU Z G,CHEN Y F,et al.Design and Implementation of a SDN Honeynet Based on Dynamic Docker[J].Netinfo Security,2022,22(4):40-48. [65]ACHLEITNER S,PORTA T F L,MCDANIEL P,et al.Deceiving Network Reconnaissance Using SDN-Based Virtual Topo-logies[J].IEEE Transactions on Network and Service Management,2017:1098-1112. [66]AVERY J,SPAFFORD E H.Ghost Patches:Fake Patches forFake Vulnerabilities[C]//IFIP Advances in Information and Communication Technology.2017. [67]JUELS A,RIVEST R L.Honeywords:making password-cracking detectable[C]//ACM Sigsac Conference on Computer & Communications Security.2022. [68]ZHOU Y,WU Z,YANG Z T,et al.Research on Dynamic Adaptive Network Security Defense Based on Deception Defense[J].Technology Research,2022,3:54-60. [69]KYUNG S,HAN W,TIWARI N,et al.HoneyProxy:Designand implementation of next-generation honeynet via SDN[C]//IEEE Conference on Communications and Network Security(CNS).2017. [70]ALBANESE M,BATTISTA E,JAJODIA S.A deception based approach for defeating OS and service fingerprinting[C]//2015 IEEE Conference on Communications and Network Security(CNS).IEEE,2015:317-325. [71]ROBERTSON S,ALEXANDER S,MICALLEF J,et al.CIN-DAM:Customized Information Networks for Deception and Attack Mitigation[C]//IEEE International Conference on Self-adaptive & Self-organizing Systems Workshops.2015. [72]LU X Y,YI P,BU Y J,et al.SDN Honeynet Based on Network Deception Mechanism[J].Journal of Information Engineering University,2022,23(4):471-477. [73]YANG T S,DIAO P J,LIANG L L,et al.Active ForensicsTechnology of Honeypot Based on OpenFlow[J].Transactions of Beijing Institute of Technology,2019,39(5):545-550. [74]JIA Z P,FANG B X,CUI X,et al.ArkHoney:A Web Honeypot Based on COllaborative Mechanisms[J].Chinese Journal of Computers,2018,41(2):413-425. [75]GAO Y Z,LIU Y Q,ZHANG G M,et al.Multi-stage Game Based Dynamic Deployment Mechanism of Virtualized Honeypots[J].Computer Science,2021,48(10):294-300. [76]SARR A B,ANWARA H,KAMHOUA C,et al.Software Diversity for Cyber Deception[C]//GLOBECOM 2020-2020 IEEE Global Communications Conference.2020. [77]ABAY N C,AKCORA C G,ZHOU Y,et al.Using Deep Lear-ning to Generate Relational HoneyData[J].Autonomous Cyber Deception,2019:3-19. [78]EDDABBAH M,LMOUMEN Y,TOUAHNI R.A Smart Agent Design for Cyber Security Based on Honeypot and Machine Learning[J].Hindawi,Security and Communication Networks,2020,2020(1):8865474. [79]SONG L H,JIANG Y Y,XING C Y,et al.Optimization mechanism of attack and defense strategy in honeypot game with evidence for deception[J].Journal on Communications,2022,41(11):104-116. [80]LI C H,TANG J J,CHEN Y T,et al.Dynamic scheduling method of service function chain executors based on the mimic defense architecture[J].Telecommunications Science,2022,38(4):101-112. [81]SONG K,LIU Q R,WEI S,et al.Endogenous security architec-ture of Ethernet switch based on mimic defense[J].Journal on Communications,2020,41(5):18-26. [82]PU L M,WEI H Q,LI X,et al.Mimic cloud service architecture for cloud applications[J].Chinese Journal of Network and Information Security,2021,7(1):101-112. [83]WEI S,YU H,GU Z Y,et al.Architecture of Mimic Security Processor for Industry Control System[J].Journal of Cyber Security,2017,2(1):54-73. [84]MA H L,WANG L,HU T,et al.Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology[J].Chinese Journal of Network and Information Security,2022,8(2):15-38. [85]SANG X N.Research on dynamic scheduling algorithm for mimicdefense architecture[D].Nanjing:Nanjing University of Science and Technology. [86]SHEN C Q,CHEN S X,WU C M,et al.Adaptive mimic defensive controller framework based on reputation and dissimilarity[J].Journal on Communications,2018,39(s2):173-180. [87]YU F,LIU K,GENG Y Y,et al.Multi executor decision algo-rithm and scheduling algorithm based on differential distance feedback[J].Application Research of Computers,2022,39(5):1437-1443. [88]WANG R M,XING Y X,SONG W,et al.Secure Scheduling Al-gorithm for Heterogeneous Executors for Mimic Clouds[J].Netinfo Security,2023,23(3):45-55. [89]LI W C,ZHANG Z,WANG L Q,et al.The Modeling and Risk Assessment on Redundancy Adjudication of Mimic Defense[J].Journal of Cyber Security,2018,3(5):64-74. [90]WU Z Q,ZHANG F,GUO W,et al.A Mimic Arbitration Optimization Method Based on Heterogeneous Degree of Executors[J].Computer Engineering,2020,46(5):12-18. [91]GAO Z B,JIANG G R,ZHANG W J,et al.Mimic ruling optimization method based on executive outliers[J].Application Research of Computers,2021,38(7):2066-2071. [92]YAO Q,XIONGX L,WANG Y J,et al.Review of moving target defense:an analysis of vulnerability and applications in new scenarios[J].Control and Decision,2023,38(11):3025-3038. [93]Deception Defense System[J].Computer Engineering and Applications,2022,58(15):124-132 |
[1] | LIU Xuanyu, ZHANG Shuai, HUO Shumin, SHANG Ke. Microservice Moving Target Defense Strategy Based on Adaptive Genetic Algorithm [J]. Computer Science, 2023, 50(9): 82-89. |
[2] | YANG Xin, LI Hui, QUE Jianming, MA Zhentai, LI Gengxin, YAO Yao, WANG Bin, JIANG Fuli. Efficiently Secure Architecture for Future Network [J]. Computer Science, 2023, 50(3): 360-370. |
[3] | GAO Zhen, CHEN Fucai, WANG Yawen, HE Weizhen. VPN Traffic Hijacking Defense Technology Based on Mimic Defense [J]. Computer Science, 2023, 50(11): 340-347. |
[4] | JIANG Yang-yang, SONG Li-hua, XING Chang-you, ZHANG Guo-min, ZENG Qing-wei. Belief Driven Attack and Defense Policy Optimization Mechanism in Honeypot Game [J]. Computer Science, 2022, 49(9): 333-339. |
[5] | GAO Chun-gang, WANG Yong-jie, XIONG Xin-li. MTDCD:A Hybrid Defense Mechanism Against Network Intrusion [J]. Computer Science, 2022, 49(7): 324-331. |
[6] | LIU Wen-he, JIA Hong-yong, PAN Yun-fei. Mimic Firewall Executor Scheduling Algorithm Based on Executor Defense Ability [J]. Computer Science, 2022, 49(11A): 211200296-6. |
[7] | HE Yuan, XING Chang-you, ZHANG Guo-min, SONG Li-hua, YU Hang. Differential Privacy Based Fingerprinting Obfuscation Mechanism Towards NetworkReconnaissance Deception [J]. Computer Science, 2022, 49(11): 351-359. |
[8] | YANG Lin, WANG Yong-jie, ZHANG Jun. FAWA:A Negative Feedback Dynamic Scheduling Algorithm for Heterogeneous Executor [J]. Computer Science, 2021, 48(8): 284-290. |
[9] | LI Shao-hui, ZHANG Guo-min, SONG Li-hua, WANG Xiu-lei. Incomplete Information Game Theoretic Analysis to Defend Fingerprinting [J]. Computer Science, 2021, 48(8): 291-299. |
[10] | HONG Hai-cheng,CHEN Dan-wei. Replica Dynamic Storage Based on RBEC [J]. Computer Science, 2020, 47(2): 313-319. |
[11] | ZHAO Jin-long, ZHANG Guo-min, XING Chang-you, SONG Li-hua, ZONG Yi-ben. Self-adaptive Deception Defense Mechanism Against Network Reconnaissance [J]. Computer Science, 2020, 47(12): 304-310. |
[12] | CHANG Xiao-lin, FAN Yong-wen, ZHU Wei-jun, LIU Yang. Management Information System Based on Mimic Defense [J]. Computer Science, 2019, 46(11A): 438-441. |
[13] | ZHANG Jie-xin, PANG Jian-min, ZHANG Zheng, TAI Ming, LIU Hao. QoS Quantification Method for Web Server with Mimic Construction [J]. Computer Science, 2019, 46(11): 109-118. |
[14] | WANG Wei, YANG Ben-chao, LI Guang-song, SI Xue-ming. Security Analysis of Heterogeneous Redundant Systems [J]. Computer Science, 2018, 45(9): 183-186. |
[15] | WU Ze-hui, WEI Qiang and WANG Qing-xian. Survey for Attack and Defense Approaches of OpenFlow-enabled Software Defined Network [J]. Computer Science, 2017, 44(6): 121-132. |
|