Towards Cost-Effective Moving Target Defense Against DDoS and Covert Channel Attacks
暂无分享,去创建一个
[1] Scott A. DeLoach,et al. Model-driven, Moving-Target Defense for Enterprise Network Security , 2011, Models@run.time@Dagstuhl.
[2] Fei Li,et al. Catch Me If You Can: A Cloud-Enabled DDoS Defense , 2014, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[3] Sudhir Aggarwal,et al. Password Cracking Using Probabilistic Context-Free Grammars , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[4] Fei Li,et al. A moving target DDoS defense mechanism , 2014, Comput. Commun..
[5] Sheldon M. Ross,et al. Introduction to probability models , 1975 .
[6] Aziz Mohaisen,et al. Delving into Internet DDoS Attacks by Botnets: Characterization and Analysis , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[7] Kevin M. Carter,et al. Adaptive Attacker Strategy Development Against Moving Target Cyber Defenses , 2014, ArXiv.
[8] Ehab Al-Shaer,et al. Adversary-aware IP address randomization for proactive agility against sophisticated attackers , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[9] Scott A. DeLoach,et al. A model for analyzing the effect of moving target defenses on enterprise networks , 2014, CISR '14.
[10] Ehab Al-Shaer,et al. Random Host Mutation for Moving Target Defense , 2012, SecureComm.
[11] Yulong Zhang,et al. Improving Cloud Survivability through Dependency based Virtual Machine Placement , 2012, SECRYPT.
[12] Jun Li,et al. Behavior-Based Worm Detectors Compared , 2010, RAID.
[13] Zhenyu Wu,et al. A Measurement Study on Co-residence Threat inside the Cloud , 2015, USENIX Security Symposium.
[14] Scott A. DeLoach,et al. A Theory of Cyber Attacks: A Step Towards Analyzing MTD Systems , 2015, MTD@CCS.
[15] Salim Hariri,et al. Autonomic Resilient Cloud Management (ARCM) Design and Evaluation , 2014, 2014 International Conference on Cloud and Autonomic Computing.
[16] Vyas Sekar,et al. Nomad: Mitigating Arbitrary Cloud Side Channels via Provider-Assisted Migration , 2015, CCS.
[17] Richard Ford,et al. Moving-Target Defenses for Computer Networks , 2014, IEEE Security & Privacy.
[18] Brett Benyo,et al. Managed Execution Environment as a Moving-Target Defense Infrastructure , 2014, IEEE Security & Privacy.
[19] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[20] Michael M. Swift,et al. A Placement Vulnerability Study in Multi-Tenant Public Clouds , 2015, USENIX Security Symposium.
[21] Ehab Al-Shaer,et al. Agile virtualized infrastructure to proactively defend against cyber attacks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[22] Nathaniel Evans,et al. Multiple OS rotational environment an implemented Moving Target Defense , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).
[23] Dijiang Huang,et al. Moving Target Defense , 2018, Software-Defined Networking and Security.
[24] Mark E. J. Newman,et al. Power-Law Distributions in Empirical Data , 2007, SIAM Rev..
[25] Daniel S. Yeung,et al. A covariance analysis model for DDoS attack detection , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[26] Michael K. Reiter,et al. HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis , 2011, 2011 IEEE Symposium on Security and Privacy.