The SDN Shuffle: Creating a Moving-Target Defense using Host-based Software-Defined Networking
暂无分享,去创建一个
[1] Curtis R. Taylor,et al. On building inexpensive network capabilities , 2012, CCRV.
[2] Dan Rubenstein,et al. Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[3] Xin Huang,et al. Tango: Simplifying SDN Control with Automatic Switch Property Inference, Abstraction, and Optimization , 2014, CoNEXT.
[4] Joseph G. Tront,et al. MT6D: A Moving Target IPv6 Defense , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[5] Sujata Banerjee,et al. DevoFlow: scaling flow management for high-performance networks , 2011, SIGCOMM.
[6] Craig A. Shue,et al. Characterizing Network-Based Moving Target Defenses , 2015, MTD@CCS.
[7] Ehab Al-Shaer,et al. Openflow random host mutation: transparent moving target defense using software defined networking , 2012, HotSDN '12.
[8] Fang Hao,et al. Scotch: Elastically Scaling up SDN Control-Plane using vSwitch based Overlay , 2014, CoNEXT.
[9] Sakir Sezer,et al. Sdn Security: A Survey , 2013, 2013 IEEE SDN for Future Networks and Services (SDN4FNS).
[10] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[11] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[12] Nick McKeown,et al. OpenFlow: enabling innovation in campus networks , 2008, CCRV.
[13] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[14] Andreas Terzis,et al. On the impact of dynamic addressing on malware propagation , 2006, WORM '06.
[15] William W. Streilein,et al. Finding Focus in the Blur of Moving-Target Techniques , 2014, IEEE Security & Privacy.
[16] Spyros Antonatos,et al. TAO: Protecting Against Hitlist Worms Using Transparent Address Obfuscation , 2006, Communications and Multimedia Security.
[17] Evangelos P. Markatos,et al. Defending against hitlist worms using network address space randomization , 2005, WORM '05.