1.College of Electronic Engineering, National University of Defense Technology, Hefei 230037, China
2.Anhui Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei 230037, China
[1] 徐焱,贾晓璐.内网安全攻防:渗透测试实战指南[J].中国信息化,2020,310(2):99.
XU Y,JIA X L.Intranet security attack and defense:a practical guide to penetration testing[J].China Information Technology,2020,310(2):99.
[2] PING C,DESMET L,HUYGENS C.A study on advanced persistent threats[C]//IFIP International Conference on Communications and Multimedia Security.Berlin Heidelberg:Springer,2014.
[3] BOWERS K,VAN DIJK M,GRIFFIN R,et al.Defending against the unknown enemy:applying flipit to system security[C]//Proceedings of the 3rd Conference on the Decision and Game Theory for Security(GameSec),2012:248-263.
[4] WANG C,LU Z.Cyber deception:overview and the road ahead[J].IEEE Security & Privacy,2018,16(2):80-85.
[5] 贾召鹏,方滨兴,刘潮歌,等.网络欺骗技术综述[J].通信学报,2017,38(12):128-143.
JIA Z P,FANG B X,LIU C G,et al.Survey on cyber deception[J].Journal on Communications,2017,38(12):128-143.
[6] UITTO J,RAUTI S,LAURéN S,et al.A survey on anti-honeypot and anti-introspection methods[C]//World Conference on Information Systems & Technologies,2017.
[7] JAJODIA S,GHOSH A K,SWARUP V,et al.Moving target defense[M].New York:Springer,2011:23-35.
[8] XU J,GUO P,ZHAO M,et al.Comparing different moving target defense techniques[C]//Proceedings of ACM Workshop on Moving Target Defense,2014:97-107.
[9] AL-SHAER E.Toward network configuration randomization for moving target defense[M]//Moving target defense.[S.l.]:Springer,2011:153-159.
[10] FEAMSTER N,REXFORD J,ZEGURA E.The road to SDN:an intellectual history of programmable networks[J].Computer Communication Review:A Quarterly Publication of the Special Interest Group on Data Communication,2014(2):87-98.
[11] AKIYAMA M,YAGI T,HARIU T,et al.Honey circulator:distributing credential honeytoken for introspection of web-based attack cycle[J].International Journal of Information Security,2018,17:135-151.
[12] ACHLEITNER S,PORTA T L,MCDANIEL P,et al.Cyber deception:virtual networks to defend insider reconnaissance[C]//2016 International Workshop,2016.
[13] ZHAN S,YAN G.Ensuring deception consistency for FTP services hardened against advanced persistent threats[C]//The 5th ACM Workshop,2018.
[14] RRUSHI J L.NIC displays to thwart malware attacks mounted from within the OS[J].Computers & Security,2016,61:59-71.
[15] RUBIO-MEDRANO C E,DOUP A,YAN S,et al.HoneyPLC:a next-generation honeypot for industrial control systems[C]//2020 ACM SIGSAC Conference on Computer and Communications Security,2020.
[16] ZHE L,YIN X,REN T A N,et al.SDN virtual honeynet for network attack information acquisition[J].DEStech Transactions on Computer Science and Engineering,2017,2:123-125.
[17] KONG T,WANG L,MA D,et al.Automated honeynet deployment strategy for active defense in container-based cloud[C]//2020 IEEE 22nd International Conference on High Performance Computing and Communications;IEEE 18th International Conference on Smart City;IEEE 6th International Conference on Data Science and Systems(HPCC/SmartCity/DSS),2020.
[18] NIAKANLAHIJI A,JAFARIAN J H,CHU B T,et al.HoneyBug:personalized cyber deception for Web applications[C]//Hawaii International Conference on System Sciences 2020(HICSS 53),2020.
[19] SENGUPTA S,CHOWDHARY A,SABUR A,et al.A survey of moving target defenses for network security[J].IEEE Communications Surveys & Tutorials,2019,22(3):1909-1941.
[20] YANG Y,CHENG L.An SDN-based MTD model[J].Concurrency and Computation:Practice and Experience,2018,31.
[21] LIU Z,HE Y,WANG W,et al.AEH-MTD:adaptive moving target defense scheme for SDN[C]//2019 IEEE International Conference on Smart Internet of Things(SmartIoT),2019.
[22] NARANTUYA J,YOON S,LIM H,et al.SDN-based IP shuffling moving target defense with multiple SDN controllers[C]//2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks-Supplemental Volume(DSN-S),2019.
[23] WANG P,ZHOU M,DING Z.A two-layer IP hopping-based moving target defense approach to enhancing the security of mobile ad-hoc networks[J].Sensors,2021,21(7):2355.
[24] DADHEECH K,CHOUDHARY A,BHATIA G.De-militarized zone:a next level to network security[C]//2018 Second International Conference on Inventive Communication and Computational Technologies(ICICCT),2018:595-600.
[25] JAIN S,KUMAR A,MANDAL S,et al.B4:experience with a globally-deployed software defined WAN[C]//Computer Communication Review,2013:3-14.
[26] DAS T,GURUSAMY M.Controller placement for resilient network state synchronization in multi-controller SDN[J].IEEE Communications Letters,2020,24(6):1299-1303.
[27] TZENG Y Y,SHEN C A.An integrated multi-controller management framework for highly reliable software defined networking[J].Telecommunication Systems,2021,77:377-388.
[28] OLIVEIRA R,SCHWEITZER C M,SHINODA A A,et al.Using mininet for emulation and prototyping software-defined networks[C]//Communications & Computing,2014.
WANG Juan1,2,3, LIU Shihui2,3, WEN Ru2,3, HONG Zhi2,3, WANG Jiang4, FAN Chengyang3, ZHANG Haozhe3.
State firewall of SDN based on OpenFlow
[J]. Computer Engineering and Applications, 2018, 54(15): 84-90.