A Game-Theoretic Approach to IP Address Randomization in Decoy-Based Cyber Defense
暂无分享,去创建一个
Radha Poovendran | Linda Bushnell | Kun Sun | Andrew Clark | L. Bushnell | Andrew Clark | R. Poovendran | Kun Sun
[1] Michael Franz,et al. E unibus pluram: massive-scale software diversity as a defense mechanism , 2010, NSPW '10.
[2] Per Larsen,et al. Automated Software Diversity , 2015, Automated Software Diversity.
[3] Kevin M. Carter,et al. A Game Theoretic Approach to Strategy Determination for Dynamic Platform Defenses , 2014, MTD '14.
[4] Sushil Jajodia,et al. Moving Target Defense II , 2013, Advances in Information Security.
[5] H. Hurley. computer networking. , 1996, Ostomy/wound management.
[6] Tansu Alpcan,et al. Network Security , 2010 .
[7] J. Robinson. AN ITERATIVE METHOD OF SOLVING A GAME , 1951, Classics in Game Theory.
[8] Evangelos P. Markatos,et al. Defending against hitlist worms using network address space randomization , 2007, Comput. Networks.
[9] Andrew H. Sung,et al. Detection of Virtual Environments and Low Interaction Honeypots , 2007 .
[10] Quanyan Zhu,et al. Game-Theoretic Approach to Feedback-Driven Multi-stage Moving Target Defense , 2013, GameSec.
[11] Maria Kihl,et al. Web server performance modeling using an M/G/1/K*PS queue , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..
[12] Andreas Terzis,et al. On the impact of dynamic addressing on malware propagation , 2006, WORM '06.
[13] Karl N. Levitt,et al. Artificial Diversity as Maneuvers in a Control Theoretic Moving Target Defense , 2012 .
[14] Niels Provos,et al. A Virtual Honeypot Framework , 2004, USENIX Security Symposium.
[15] Sheldon M. Ross,et al. Introduction to probability models , 1975 .
[16] Radha Poovendran,et al. Effectiveness of IP address randomization in decoy-based moving target defense , 2013, 52nd IEEE Conference on Decision and Control.
[17] Liviu Iftode,et al. Migratory TCP: connection migration for service continuity in the Internet , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[18] David Chisnall,et al. The Definitive Guide to the Xen Hypervisor , 2007 .
[19] João Pedro Hespanha,et al. Game Theoretic Stochastic Routing for Fault Tolerance and Security in Computer Networks , 2007, IEEE Transactions on Parallel and Distributed Systems.
[20] Ronald L. Rivest,et al. FlipIt: The Game of “Stealthy Takeover” , 2012, Journal of Cryptology.
[21] Per Larsen,et al. SoK: Automated Software Diversity , 2014, 2014 IEEE Symposium on Security and Privacy.
[22] Ehab Al-Shaer,et al. Spatio-temporal Address Mutation for Proactive Cyber Agility against Sophisticated Attackers , 2014, MTD '14.
[23] Dmitri Loguinov,et al. Hershel: Single-Packet OS Fingerprinting , 2016, TNET.
[24] T. Holz,et al. Detecting honeypots and other suspicious environments , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[25] Cristiano Giuffrida,et al. Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization , 2012, USENIX Security Symposium.