移动目标防御的攻击面动态转移技术研究综述
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Survey on Attack Surface Dynamic Transfer Technology Based on Moving Target Defense
  • 作者:周余阳 ; 程光 ; 郭春生 ; 戴冕
  • 英文作者:ZHOU Yu-Yang;CHENG Guang;GUO Chun-Sheng;DAI Mian;School of Computer Science and Engineering,Southeast University;School of Cyber Science and Technology,Southeast University;Key Laboratory of Computer Network and Information Integration of Ministry of Education (Southeast University);
  • 关键词:移动目标防御 ; 攻击面 ; 网络空间安全 ; 动态转移技术
  • 英文关键词:moving target defense;;attack surface;;cyberspace security;;dynamic transfer technology
  • 中文刊名:RJXB
  • 英文刊名:Journal of Software
  • 机构:东南大学计算机科学与工程学院;东南大学网络空间安全学院;教育部计算机网络和信息集成重点实验室(东南大学);
  • 出版日期:2018-06-07 14:53
  • 出版单位:软件学报
  • 年:2018
  • 期:v.29
  • 基金:国家自然科学基金(61602114);; 国家重点研发计划(2017YFB0801703)~~
  • 语种:中文;
  • 页:RJXB201809017
  • 页数:22
  • CN:09
  • ISSN:11-2560/TP
  • 分类号:259-280
摘要
移动目标防御作为一种动态、主动的防御技术,能够通过不断转移攻击面,减少系统的静态性、同构性和确定性,以此挫败攻击者的攻击.随着网络攻击手段的不断发展和变化,深入研究移动目标防御对网络空间安全具有重要意义,而攻击面的动态转移技术作为移动目标防御领域的重点问题,一直受到研究人员的广泛关注.利用攻击面动态转移技术所具有的不确定性、动态性和随机性等优势,实现信息系统的动态防御,可以有效克服传统防御手段的确定性、静态性和同构性的不足.首先梳理了攻击面的基本概念,并具体阐释了攻击面以及攻击面转移的形式化定义;其次,分析了攻击面4个层次的动态转移技术——数据攻击面、软件攻击面、网络攻击面和平台攻击面,并对不同的动态转移技术进行分析和比较,分别指出它们的优点和缺陷;最后,还从多层次攻击面动态转移技术的融合、攻击面动态转移的综合评估方法、基于感知的攻击面动态转移方法、基于三方博弈模型的攻击面转移决策等方面讨论了未来移动目标防御中攻击面动态转移可能的研究方向.
        As a dynamic and active defense technology,moving target defense can defeat the attacker's attack by constantly shifting the attack surface and reducing the static,isomorphic and deterministic nature of the system. With the continuous development and changes of network attacks,in-depth study of moving target defense is of great significance to China's cyberspace security. As a key problem in moving target defense field,attack surface dynamic transfer technology has attracted wide attention of researchers. The dynamic transfer technology takes advantage of uncertainty,dynamicity and randomness,can realize dynamic defense of the information system and effectively overcome the certainty,static and isomorphism of traditional defense. In this paper,the basic concept of the attack surface is first laid out,and the formal definitions of the attack surface and attack surface transfer are explained. Then,the attack surface dynamic transfer technologies are introduced from four aspects,including data attack surface,software attack surface,network attack surface and platform attack face. Furthermore,different dynamic transfer techniques,are analyzed and compared,and their advantages and shortcomings are pointed out. Finally,the future possible research directions of attack surface dynamic transfer technology are discussed with emphasis on the multi-level attack surface dynamic transfer technology integration,comprehensive evaluation method of attack surface dynamic transfer,dynamic transfer method of attack surface based on perception and attack surface transfer decision-making based on the three-party game model.
引文
[1]Jajodia S,Ghosh AK,Swarup V,et al.Moving Target Defense:Creating Asymmetric Uncertainty for Cyber Threats.New York:Springer Science&Business Media,2011.1-5.
    [2]Zhang XY,Li ZH.Overview on moving target defense technology.Communications Technology,2013,46(6):111-113(in Chinese with English abstract).
    [3]Cai GL,Wang BS,Wang TZ,et al.Research and development of moving target defense technology.Journal of Computer Research and Development,2016,53(5):968-987(in Chinese with English abstract).
    [4]Jajodia S,Ghosh AK,Subrahmanian VS,et al.Moving Target Defense II:Application of Game Theory and Adversarial Modeling.New York:Springer Science&Business Media,2013.15-40.
    [5]Okhravi H,Rabe MA,Mayberry TJ,et al.Survey of cyber moving target techniques.TR-1166.Lexington:Massachusetts Inst of Tech Lexington Lincoln Lab,2013.1-149.
    [6]Howard M,Pincus J,Wing JM.Measuring relative attack surfaces.In:Lee DT,Shieh SP,Tygar JD,eds.Computer Security in the21st Century.2003.109-137.
    [7]Manadhata PK,Tan KM,Maxion RA,et al.An approach to measuring a system’s attack surface.No.0704-0188.Pittsburgh:Carnegie-Mellon Univ Pittsburgh Pa School of Computer Science,2007.1-29.
    [8]Manadhata PK,Wing JM.An attack surface metric.IEEE Trans.on Software Engineering,2011,37(3):371-386.
    [9]Kurmus A,Tartler R,Dorneanu D,et al.Attack surface metrics and automated compile-time OS kernel tailoring.In:Proc.of the20th Annual Network&Distributed System Security Symp.(NDSS).San Diego,2013.
    [10]Peng W,Li F,Huang CT,et al.A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces.In:Proc.of the 2014 IEEE Int’l Conf.on Communications(ICC).IEEE,2014.804-809.
    [11]Foreman JC,Gurugubelli D.Identifying the cyber attack surface of the advanced metering infrastructure.The Electricity Journal,2015,28(1):94-103.
    [12]Sun K,Jajodia S.Protecting enterprise networks through attack surface expansion.In:Proc.of the 2014 Workshop on Cyber Security Analytics,Intelligence and Automation.ACM Press,2014.29-32.
    [13]Cybenko G,Jajodia S,Wellman MP,et al.Adversarial and uncertain reasoning for adaptive cyber defense:Building the scientific foundation.In:Proc.of the Int’l Conf.on Information Systems Security.Cham:Springer-Verlag,2014.1-8.
    [14]Bopche GS,Mehtre BM.Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks.Computers&Security,2017,64:16-43.
    [15]Cadar C,Akritidis P,Costa M,et al.Data randomization.Technical Report,TR-2008-120,Cambridge:Microsoft Research,2008.
    [16]Man YJ,Yin Q,Zhu XD.Fine-Grained data randomization technique based on field-sensitive pointer analysis.Journal of Computer Applications,2016,36(6):1567-1572(in Chinese English abstract).
    [17]Fen Y,Fuchao Y,Xiaobing S,et al.A new data randomization method to defend buffer overflow attacks.Physics Procedia,2012,24:1757-1764.
    [18]Gentry C.Fully homomorphic encryption using ideal lattices.In:Proc.of the 41st Annual ACM Symp.on Theory of Computing(STOC).2009,9(4):169-178.
    [19]Brakerski Z,Gentry C,Vaikuntanathan V.(Leveled)fully homomorphic encryption without bootstrapping.ACM Trans.on Computation Theory(TOCT),2014,6(3):13.
    [20]Brakerski Z.Fully homomorphic encryption without modulus switching from classical Gap SVP.In:Safavi-Naini R,Canetti R,eds.Proc.of the Advances in Cryptology(CRYPTO 2012).LNCS,Berlin:Springer-Verlag,2012.868-886.
    [21]Berkoff A,Liu FH.Leakage resilient fully homomorphic encryption.In:Proc.of the Theory of Cryptography Conf.Berlin,Heidelberg:Springer-Verlag,2014.515-539.
    [22]Ducas L,Micciancio D.FHEW:Bootstrapping homomorphic encryption in less than a second.In:Proc.of the Annual Int'l Conf.on the Theory and Applications of Cryptographic Techniques.Berlin,Heidelberg:Springer-Verlag,2015.617-640.
    [23]Lai J,Deng RH,Ma C,et al.CCA-Secure keyed-fully homomorphic encryption.In:Cheng CM,Chung KM,Persiano G,Yang BY,eds.Proc.of the Public-Key Cryptography(PKC 2016).LNCS,Berlin:Springer-Verlag,2016.70-98.
    [24]Ammann PE,Knight JC.Data diversity:An approach to software fault tolerance.IEEE Trans.on Computers,1988,37(4):418-425.
    [25]Nguyen-Tuong A,Evans D,Knight JC,et al.Security through redundant data diversity.In:Proc.of the IEEE Int’l Conf.on Dependable Systems and Networks with FTCS and DCC(DSN 2008).IEEE,2008.187-196.
    [26]Barus AC,Chen TY,Kuo FC,et al.A cost-effective random testing method for programs with non-numeric inputs.IEEE Trans.on Computers,2016,65(12):3509-3523.
    [27]Liu H,Chen TY.Randomized quasi-random testing.IEEE Trans.on Computers,2016,65(6):1896-1909.
    [28]Mitropoulos D,Spinellis D.Fatal injection:A survey of modern code injection attack countermeasures.Peer J Computer Science,2017,3:e136.
    [29]Nashimoto S,Homma N,Hayashi Y,et al.Buffer overflow attack with multiple fault injection and a proven countermeasure.Journal of Cryptographic Engineering,2017,7(1):35-46.
    [30]Prandini M,Ramilli M.Return-Oriented programming.IEEE Security&Privacy,2012,10(6):84-87.
    [31]Alneyadi S,Sithirasenan E,Muthukkumarasamy V.A survey on data leakage prevention systems.Journal of Network and Computer Applications,2016,62:137-152.
    [32]Lin J,Mi C,Shi Y.Approach of tamper detection for sensitive data based on negotiable hash algorithm.Int’l Journal of Performability Engineering,2017,13(5):711.
    [33]Forrest S,Somayaji A,Ackley DH.Building diverse computer systems.In:Proc.of the 6th Workshop on Hot Topics in Operating Systems.IEEE,1997.67-72.
    [34]Seo J,Lee B,Kim S,et al.SGX-Shield:Enabling address space layout randomization for SGX programs.In:Proc.of the 2017Annual Network and Distributed System Security Symp.(NDSS).San Diego,2017.
    [35]Chen Y,Wang Z,Whalley D,et al.Remix:On-demand live randomization.In:Proc.of the 6th ACM Conf.on Data and Application Security and Privacy.ACM Press,2016.50-61.
    [36]Werner J,Baltas G,Dallara R,et al.No-Execute-After-Read:Preventing code disclosure in commodity software.In:Proc.of the11th ACM on Asia Conf.on Computer and Communications Security.ACM Press,2016.35-46.
    [37]Gras B,Razavi K,Bosman E,et al.ASLR on the line:Practical cache attacks on the MMU.In:Proc.of the 2017 Annual Network and Distributed System Security Symp.(NDSS).San Diego,2017.
    [38]Thimbleby H.Can viruses ever be useful?Computers&Security,1991,10(2):111-114.
    [39]Geneiatakis D.Minimizing databases attack surface against SQL injection attacks.In:Proc.of the Int’l Conf.on Information and Communications Security.Springer Int’l Publishing,2015.1-9.
    [40]Ping C,Jinshuang W,Lin P,et al.Research and implementation of SQL injection prevention method based on ISR.In:Proc.of the2016 2nd IEEE Int’l Conf.on Computer and Communications(ICCC).IEEE,2016.1153-1156.
    [41]Wartell R,Mohan V,Hamlen KW,et al.Binary stirring:Self-randomizing instruction addresses of legacy x86 binary code.In:Proc.of the 2012 ACM Conf.on Computer and Communications Security.ACM Press,2012.157-168.
    [42]Venkat A,Shamasunder S,Shacham H,et al.Hipstr:Heterogeneous-isa program state relocation.ACM SIGARCH Computer Architecture News,2016,44(2):727-741.
    [43]Sinha K,Kemerlis VP,Sethumadhavan S.Reviving instruction set randomization.In:Proc.of the 2017 IEEE Int’l Symp.on Hardware Oriented Security and Trust(HOST).IEEE,2017.21-28.
    [44]Lee J,Jang J,Jang Y,et al.Hacking in darkness:Return-oriented programming against secure enclaves.In:Proc.of the USENIX Security.2017.523-539.
    [45]Tran M,Etheridge M,Bletsch T,et al.On the expressiveness of return-into-libc attacks.In:Proc.of the Recent Advances in Intrusion Detection.Berlin,Heidelberg:Springer-Verlag,2011.121-141.
    [46]Ruan Y,Kalyanasundaram S,Zou X.Survey of return-oriented programming defense mechanisms.Security and Communication Networks,2016,9(10):1247-1265.
    [47]Pappas V,Polychronakis M,Keromytis AD.Smashing the gadgets:Hindering return-oriented programming using in-place code randomization.In:Proc.of the 2012 IEEE Symp.on Security and Privacy(SP).IEEE,2012.601-615.
    [48]Koo H,Polychronakis M.Juggling the gadgets:Binary-level code randomization using instruction displacement.In:Proc.of the11th ACM on Asia Conf.on Computer and Communications Security.ACM Press,2016.23-34.
    [49]Chen X,Bos H,Giuffrida C.Code Armor:Virtualizing the code space to counter disclosure attacks.In:Proc.of the 2017 IEEE European Symp.on Security and Privacy(Euro S&P).IEEE,2017.514-529.
    [50]Snow KZ,Monrose F,Davi L,et al.Just-in-Time code reuse:On the effectiveness of fine-grained address space layout randomization.In:Proc.of the 2013 IEEE Symp.on Security and Privacy(SP).IEEE,2013.574-588.
    [51]Carlini N,Wagner D.ROP is still dangerous:Breaking modern defenses.In:Proc.of the USENIX Security Symp.2014.385-399.
    [52]Maisuradze G,Backes M,Rossow C.What cannot be read,cannot be leveraged?Revisiting assumptions of JIT-ROP defenses.In:Proc.of the USENIX Security Symp.2016.139-156.
    [53]Temizkan O,Park S,Saydam C.Software diversity for improved network security:Optimal distribution of software-based shared vulnerabilities.Information Systems Research,2017,28(4):828-849.
    [54]Cui W,Peinado M,Cha SK,et al.Retracer:Triaging crashes by reverse execution from partial memory dumps.In:Proc.of the38th Int’l Conf.on Software Engineering.ACM Press,2016.820-831.
    [55]Crane S,Liebchen C,Homescu A,et al.Readactor:Practical code randomization resilient to memory disclosure.In:Proc.of the2015 IEEE Symp.on Security and Privacy(SP).IEEE,2015.763-780.
    [56]Tagatac DM,Polychronakis M,Stolfo SJ.Using diversity to harden multithreaded programs against exploitation.2016 IEEE 2nd Int’l Conf.on Big Data Security on Cloud(Big Data Security),IEEE Int’l Conf.on High Performance and Smart Computing(HPSC),and IEEE Int’l Conf.on Intelligent Data and Security(IDS).IEEE,2016.208-213.
    [57]Shterenberg SI,Krasov AV,Ushakov IA.Analysis of using equivalent instructions at the hidden embedding of information into the executable files.Journal of Theoretical and Applied Information Technology,2015,80(1):28.
    [58]Volckaert S,Coppens B,De Sutter B.Cloning your gadgets:Complete ROP attack immunity with multi-variant execution.IEEE Trans.on Dependable and Secure Computing,2016,13(4):437-450.
    [59]Volckaert S,Coppens B,De Sutter B,et al.Taming parallelism in a multi-variant execution environment.In:Proc.of the 12th European Conf.on Computer Systems.ACM Press,2017.270-285.
    [60]Al-Shaer E.Toward network configuration randomization for moving target defense.In:Jajodia S,Ghosh AK,Swarup V,et al,eds.Proc.of the Moving Target Defense:Creating Asymmetric Uncertainty for Cyber Threats.New York:Springer Science&Business Media,2011.153-159.
    [61]Yackoski J,Bullen H,Yu X,et al.Applying self-shielding dynamics to the network architecture.In:Jajodia S,Ghosh AK,Swarup V,et al,eds.Proc.of the Moving Target Defense II:Application of Game Theory and Adversarial Modeling.New York:Springer Science&Business Media,2013.97-115.
    [62]Yackoski J,Li J,De Loach SA,et al.Mission-Oriented moving target defense based on cryptographically strong network dynamics.In:Proc.of the 8th Annual Cyber Security and Information Intelligence Research Workshop.ACM Press,2013.57.
    [63]Jia Q,Sun K,Stavrou A.Motag:Moving target defense against internet denial of service attacks.In:Proc.of the 2013 22nd Int’l Conf.on Computer Communications and Networks(ICCCN).IEEE,2013.1-9.
    [64]Albanese M,De Benedictis A,Jajodia S,et al.A moving target defense mechanism for Manets based on identity virtualization.In:Proc.of the 2013 IEEE Conf.on Communications and Network Security(CNS).IEEE,2013.278-286.
    [65]Kampanakis P,Perros H,Beyene T.SDN-Based solutions for moving target defense network protection.In:Proc.of the 2014 IEEE15th Int’l Symp.on a World of Wireless,Mobile and Multimedia Networks(Wo WMo M).IEEE,2014.1-6.
    [66]Wang L,Wu D.Moving target defense against network reconnaissance with software defined networking.In:Proc.of the Int’l Conf.on Information Security.Cham:Springer-Verlag,2016.203-217.
    [67]Jafarian JH,Al-Shaer E,Duan Q.Openflow random host mutation:Transparent moving target defense using software defined networking.In:Proc.of the 1st Workshop on Hot Topics in Software Defined Networks.ACM Press,2012.127-132.
    [68]Jafarian JHH,Al-Shaer E,Duan Q.Spatio-Temporal address mutation for proactive cyber agility against sophisticated attackers.In:Proc.of the 1st ACM Workshop on Moving Target Defense.ACM Press,2014.69-78.
    [69]Wang S,Zhang L,Tang C.A new dynamic address solution for moving target defense.In:Proc.of the Information Technology,Networking,Electronic and Automation Control Conf.,IEEE.IEEE,2016.1149-1152.
    [70]Makanju A,Zincir-Heywood AN,Kiyomoto S.On evolutionary computation for moving target defense in software defined networks.In:Proc.of the Genetic and Evolutionary Computation Conf.on Companion.ACM Press,2017.287-288.
    [71]Lin K,Jia CF.End hopping based on message tampering.Journal on Communications,2013,34(12):142-148(in Chinese with English abstract)
    [72]Luo YB,Wang BS,Wang XF,et al.RPAH:Random port and address hopping for thwarting internal and external adversaries.In:Proc.of the 2015 IEEE Trustcom/Big Data SE/ISPA.IEEE,2015.263-270.
    [73]Ma D,Lei C,Wang L,et al.A self-adaptive hopping approach of moving target defense to thwart scanning attacks.In:Proc.of the Int’l Conf.on Information and Communications Security.Cham:Springer-Verlag,2016.39-53.
    [74]Lei C,Ma DH,Zhang HQ,Yang YJ,Wang LM.Moving target defense technique based on network attack surface self-adaptive mutation.Chinese Journal of Computers,2018,41(5):1109-1131(in Chinese with English abstract).http://kns.cnki.net/kcms/detail/11.1826.TP.20170819.0034.010.html
    [75]Zhao Z,Gong D,Lu B,et al.SDN-Based double hopping communication against sniffer attack.In:Proc.of the Mathematical Problems in Engineering,2016.2016.
    [76]Lucas B,Fulp EW,John DJ,et al.An initial framework for evolving computer configurations as a moving target defense.In:Proc.of the 9th Annual Cyber and Information Security Research Conf.ACM Press,2014.69-72.
    [77]John DJ,Smith RW,Turkett WH,et al.Evolutionary based moving target cyber defense.In:Proc.of the Companion Publication of the 2014 Annual Conf.on Genetic and Evolutionary Computation.ACM Press,2014.1261-1268.
    [78]Thompson M,Evans N,Kisekka V.Multiple OS rotational environment an implemented moving target defense.In:Proc.of the2014 7th Int’l Symp.on Resilient Control Systems(ISRCS).IEEE,2014.1-6.
    [79]Thompson M,Mendolla M,Muggler M,et al.Dynamic application rotation environment for moving target defense.In:Proc.of the2016 Resilience Week(RWS).IEEE,2016.17-26.
    [80]Debroy S,Calyam P,Nguyen M,et al.Frequency-Minimal moving target defense using software-defined networking.In:Proc.of the 2016 Int’l Conf.on Computing,Networking and Communications(ICNC).IEEE,2016.1-6.
    [81]Okhravi H,Comella A,Robinson E,et al.Creating a cyber moving target for critical infrastructure applications using platform diversity.Int’l Journal of Critical Infrastructure Protection,2012,5(1):30-39.
    [82]Bangalore AK,Sood AK.Securing Web servers using self cleansing intrusion tolerance(scit).In:Proc.of the 2nd Int’l Conf.on Dependability 2009(DEPEND 2009).IEEE,2009.60-65.
    [83]Huang Y,Ghosh AK.Introducing diversity and uncertainty to create moving attack surfaces for web services.In:Jajodia S,Ghosh AK,Swarup V,et al,eds.Proc.of the Moving Target Defense:Creating Asymmetric Uncertainty for Cyber Threats.New York:Springer Science&Business Media,2011.131-151.
    [84]Nguyen QL,Sood A.Scalability of cloud based SCIT-MTD.In:Proc.of the 2017 IEEE Int’l Conf.on Software Quality,Reliability and Security Companion(QRS-C).IEEE,2017.581-582.
    [85]Jia Q,Wang H,Fleck D,et al.Catch me if you can:A cloud-enabled ddos defense.In:Proc.of the 2014 44th Annual IEEE/IFIP Int’l Conf.on Dependable Systems and Networks(DSN).IEEE,2014.264-275.
    [86]Al-Salah T,Hong L,Shetty S.Attack surface expansion using decoys to protect virtualized infrastructure.In:Proc.of the 2017IEEE Int’l Conf.on Edge Computing(EDGE).IEEE,2017.216-219.
    [87]Huang R,Zhang H,Liu Y,et al.RELOCATE:A container based moving target defense approach.In:Proc.of the 2017 7th Int’l Conf.on Computer Engineering and Networks(CENet 2017).Shanghai,2017.href=“https://pos.sissa.it/cgi-bin/reader/conf.cgi?confid=299”>https://pos.sissa.it/cgi-bin/reader/conf.cgi?confid=299,id.8
    [88]Vadlamudi SG,Sengupta S,Taguinod M,et al.Moving target defense for Web applications using bayesian stackelberg games.In:Proc.of the 2016 Int’l Conf.on Autonomous Agents&Multiagent Systems.Int’l Foundation for Autonomous Agents and Multiagent Systems,2016.1377-1378.
    [89]Sengupta S,Vadlamudi SG,Kambhampati S,et al.A game theoretic approach to strategy generation for moving target defense in Web applications.In:Proc.of the 16th Conf.on Autonomous Agents and Multi Agent Systems.Int’l Foundation for Autonomous Agents and Multiagent Systems,2017.178-186.
    [90]Heydari V,Kim S,Yoo SM.Anti-Censorship framework using mobile ipv6 based moving target defense.In:Proc.of the 11th Annual Cyber and Information Security Research Conf.ACM Press,2016.7.
    [91]Heydari V,Kim S,Yoo SM.Scalable anti-censorship framework using moving target defense for Web servers.IEEE Trans.on Information Forensics and Security,2017,12(5):1113-1124.
    [92]Niakanlahiji A,Jafarian JH.Web MTD:Defeating Web code injection attacks using Web element attribute mutation.In:Proc.of the2017 Workshop on Moving Target Defense.ACM Press,2017.17-26.
    [93]Lee B,Lu L,Wang T,et al.From zygote to morula:Fortifying weakened aslr on android.In:Proc.of the 2014 IEEE Symp.on Security and Privacy(SP).IEEE,2014.424-439.
    [94]Liang Y,Ma X,Wu D,et al.Stack layout randomization with minimal rewriting of Android binaries.In:Proc.of the Int’l Conf.on Information Security and Cryptology.Springer Int’l Publishing,2015.229-245.
    [95]Braden K,Davi L,Liebchen C,et al.Leakage-Resilient layout randomization for mobile devices.In:Proc.of the 20th Annual Network&Distributed System Security Symp.(NDSS).San Diego,2016.
    [96]Parikh V,Mateti P.ASLR and ROP attack mitigations for ARM-based android devices.In:Proc.of the Int’l Symp.on Security in Computing and Communication.Singapore:Springer-Verlag,2017.350-363.
    [97]Manadhata PK.Game theoretic approaches to attack surface shifting.In:Jajodia S,Ghosh AK,Swarup V,et al,eds.Proc.of the Moving Target Defense II:Application of Game Theory and Adversarial Modeling.New York:Springer Science&Business Media,2013.1-13.
    [98]Carter KM,Riordan JF,Okhravi H.A game theoretic approach to strategy determination for dynamic platform defenses.In:Proc.of the 1st ACM Workshop on Moving Target Defense.ACM Press,2014.21-30.
    [99]Wright M,Venkatesan S,Albanese M,et al.Moving target defense against DDo S attacks:An empirical game-theoretic analysis.In:Proc.of the 3rd ACM Workshop on Moving Target Defense.ACM Press,2016.93-104.
    [100]Feng X,Zheng Z,Cansever D,et al.A signaling game model for moving target defense.In:Proc.of the INFOCOM 2017—IEEE Conf.on Computer Communications.IEEE,2017.1-9.
    [101]Miehling E,Rasouli M,Teneketzis D.Optimal defense policies for partially observable spreading processes on bayesian attack graphs.In:Proc.of the 2nd ACM Workshop on Moving Target Defense.ACM Press,2015.67-76.
    [102]Maleki H,Valizadeh S,Koch W,et al.Markov modeling of moving target defense games.In:Proc.of the 3rd ACM Workshop on Moving Target Defense.ACM Press,2016.81-92.
    [103]Lei C,Ma DH,Zhang HQ.Optimal strategy selection for moving target defense based on Markov game.IEEE Access,2017,5:156-169.
    [104]Zhuang R,De Loach SA,Ou X.A model for analyzing the effect of moving target defenses on enterprise networks.In:Proc.of the9th Annual Cyber and Information Security Research Conf.ACM Press,2014.73-76.
    [105]Do CT,Tran NH,Hong C,et al.Game theory for cyber security and privacy.ACM Computing Surveys(CSUR),2017,50(2):30.
    [106]Nguyen TH,Wright M,Wellman MP,et al.Multi-Stage attack graph security games:Heuristic strategies,with empirical gametheoretic analysis.In:Proc.of the 2017 Workshop on Moving Target Defense.ACM Press,2017.17-26.
    [2]张晓玉,李振邦.移动目标防御技术综述.通信技术,2013,46(6):111-113.
    [3]蔡桂林,王宝生,王天佐,等.移动目标防御技术研究进展.计算机研究与发展,2016,53(5):968-987.
    [16]蔄羽佳,尹青,朱晓东.基于域敏感指针分析的细粒度数据随机化技术.计算机应用,2016,36(6):1567-1572.
    [71]林楷,贾春福.基于消息篡改的端信息跳变技术.通信学报,2013,(12):142-148.
    [74]雷程,马多贺,张红旗,杨英杰,王利明.基于网络攻击面自适应转换的移动目标防御技术.计算机学报,2018,41(5):1109-1131.http://kns.cnki.net/kcms/detail/11.1826.TP.20170819.0034.010.html

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700