Proactive Defense Through Deception
暂无分享,去创建一个
[1] Sushil Jajodia,et al. A deception based approach for defeating OS and service fingerprinting , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[2] Jeannette M. Wing,et al. An Attack Surface Metric , 2011, IEEE Transactions on Software Engineering.
[3] Ehab Al-Shaer,et al. Efficient Random Route Mutation considering flow and network constraints , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[4] David Lee,et al. Network Protocol System Fingerprinting - A Formal Approach , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[5] Gordon Fyodor Lyon,et al. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .
[6] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[7] Sushil Jajodia,et al. A moving target defense mechanism for MANETs based on identity virtualization , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[8] Aun Haider,et al. Classification of malicious network streams using honeynets , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).
[9] Sushil Jajodia,et al. Manipulating the attacker's view of a system's attack surface , 2014, 2014 IEEE Conference on Communications and Network Security.
[10] Joseph G. Tront,et al. Implementing an IPv6 Moving Target Defense on a Live Network , 2012 .
[11] Valentina Casola,et al. A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices , 2013, IRI.
[12] Sheng-Tzong Cheng,et al. A proactive approach to intrusion detection and malware collection , 2013, Secur. Commun. Networks.
[13] Patrice Auffret. SinFP, unification of active and passive operating system fingerprinting , 2008, Journal in Computer Virology.
[14] David Watson,et al. Protocol scrubbing: network security through transparent flow modification , 2004, IEEE/ACM Transactions on Networking.
[15] Valentina Casola,et al. A moving target defense approach for protecting resource-constrained distributed devices , 2013, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI).
[16] Sushil Jajodia,et al. Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats , 2011, Moving Target Defense.