References
- Martin, Lockheed. "Cyber Kill Chain." Available: http://cyber.lockheedmartin.com/hubfs/Gainingthe AdvantageCyberKillChain.pdf, 2014
- Cai, Gui-lin, et al, "Moving target defense: state of the art and characteristics," Frontiers of Information Technology & Elec-tronic Engineering, pp. 1122-1153, 2016.
- Hamed, et al. "Finding focus in the blur of moving-target techniques." IEEE Security & Privacy pp. 16-26, 2014.
- D. Kewley, R. Fink, J. Lowry and M. Dean, "Dynamic Aproaches to Thwart Adversary Inteligence Gathering," Procedings of the DARPA Information Survivabilty Conference and Expositon, p. 176-185, 2001.
- Yackoski, Justin, et al. "A self-shielding dynamic network architecture." Military communications conference, 2011-MILCOM 2011. IEEE, 2011.
- Jafarian, Jafar Haadi, Ehab Al-Shaer, and Qi Duan. "Openflow random host mutation: transparent moving target defense using software defined networking." Workshop on Hot topics in software defined networks. ACM, 2012.
- Jafarian, Jafar Haadi H., Ehab Al-Shaer, and Qi Duan. "Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers." Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014.
- J. H. Jafarian, E. Al-Shaer and Q. Duan, "An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks," IEEE Transactions on Information Forensics, vol.10, no.12, pp. 2562-2577, August 2015. https://doi.org/10.1109/TIFS.2015.2467358
- J. Sun and K. Sun, "DESIR: Decoy-enhanced seamless IP randomization," Proceedings of the IEEE ONFOCOM, 2016.
- Dunlop, Matthew, et al, "Mt6d: A moving target ipv6 defense,"IEEE Military Communications Conference, 2011.
- Luo, Yue-Bin, et al. "RPAH: Random port and address hopping for thwarting internal and external adversaries." Trustcom/BigDataSE/ISPA, Vol. 1, 2015.
- K.M.Park, S.Woo, D.S.Moon, and I.K.Kim, "Trends in Network Address Moving Technology," ETRI Electronics and Telecommunication Trends, Vol 32, 2017
- K.M.Park, S.Woo, D.S.Moon, and H. Choi, "Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat", Symmetry, 2018
- Zhao, Zheng, Fenlin Liu, and Daofu Gong, "An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting At-tacks," Security and Communication Networks, 2017.
- M. Atighetchi, P. Pal, F. Webber, and C. Jones, "Adaptive Use of Network-Centric Mechanisms in Cyber-Defense," In Object-Oriented Real-Time Distributed Computing, Sixth IEEE International Symposium on (pp. 183-192). 2003
- S. Antonatos, P. Akritidis, E.P. Markatos, and K.G. Anagnostakis, "Defending against hitlist worms using network address space randomization," Computer Networks, 51 (pp. 3471-3490) 2007. https://doi.org/10.1016/j.comnet.2007.02.006
- J. H. Jafarian, A. Niakanlahiji, E. Al-Shaer, and Q. Duan, "Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers," Proceedings of the 2016 ACM Workshop on Moving Target Defense, (pp. 47-58) 2016