[1]Studer A, Perrig A. The coremelt attack[C] Proc of European Symp on Research in Computer Security. Berlin: Springer, 2009: 3752[2]Kang M S, Lee S B, Gligor V D. The crossfire attack[C] Proc of the 2013 IEEE Symp on Security and Privacy. Piscataway, NJ: IEEE, 2013: 127141[3]Zhang Xian, Phillips C. A survey on selective routing topology inference through active probing[J]. IEEE Communications Surveys & Tutorials, 2012, 14(4): 113[4]Jacobson V. Traceroute[JOL]. 1989 [20240509]. ftp:ftp.ee.lbl.govtraceroute.tar.gz[5]Farrel A. The Internet and Its Protocols: A Comparative Approach[M]. San Francisco, CA: Morgan Kaufmann, 2004[6]Castro R, Coates M, Liang G, et al. Network tomography: Recent developments[J]. Institute of Mathematical Statistics, 2004 (3): 499517[7]Mansur A A, Zaman T. User behavior analytics in advanced persistent threats: A comprehensive review of detection and mitigation strategies[C] Proc of the 7th Int Symp on Innovative Approaches in Smart Technologies (ISAS). Piscataway, NJ: IEEE, 2023: 16[8]殷树刚, 李祉岐, 刘晓蕾, 等. 基于APT组织攻击行为的网络安全主动防御方法研究[J]. 信息安全研究, 2023, 9(5): 423432[9]Zhao Shangqing, Zhuo Lu, Wang C .When seeing isn’t believing: On feasibility and detectability of scapegoating in network tomography[C] Proc of IEEE Int Conf on Distributed Computing Systems(ICDCS). Piscataway, NJ: IEEE, 2017: 172182[10]刘宇涵, 陈红, 刘艺璇, 等. 图数据上的隐私攻击与防御技术[J]. 计算机学报, 2022, 45(4): 702734[11]Kompella R R, Yates J, Greenberg A, et al. Detection and localization of network black holes[C] Proc of the 26th IEEE Int Conf on Computer Communications. Piscataway, NJ: IEEE, 2007: 21802188[12]Almeshekah M H, Spafford E H. Cyber security deception[M] Cyber Deception: Building the Scientific Foundation, Cham: Springer, 2016: 2350[13]贾召鹏, 方滨兴, 刘潮歌, 等. 网络欺骗技术综述[J]. 通信学报, 2017, 38(12): 128143[14]赵金龙, 张国敏, 邢长友. 基于网络特征混淆的欺骗防御技术研究[J]. 网络与信息安全学报, 2021, 7(4): 4252[15]国家市场监督管理总局, 中国国家标准化管理委员会. GBT 20984—2022 信息安全技术 信息安全风险评估方法[S]. 北京: 中国标准出版社, 2022[16]Trassare S T, Beverly R, Alderson D. A technique for network topology deception[C] Proc of the 2013 IEEE Military Communications Conference. Piscataway, NJ: IEEE, 2013: 17951800[17]Gillani F, AlShaer E, Lo S, et al. Agile virtualized infrastructure to proactively defend against cyber attacks[C] Proc of the 2015 IEEE Conf on Computer Communications (INFOCOM). Piscataway, NJ: IEEE, 2015: 729737[18]Achleitner S, Porta T F L, Mcdaniel P, et al. Deceiving network reconnaissance using SDNbased virtual topologies[J]. IEEE Trans on Network and Service Management, 2017, 14(4): 10981112[19]Kim J, Shin S. Softwaredefined HoneyNet: Towards mitigating link flooding attacks[C] Proc of the 47th Annual IEEEIFIP Int Conf on Dependable Systems and Networks Workshops (DSNW). Piscataway, NJ: IEEE, 2017: 99100[20]Meier R, Tsankov P, Lenders V, et al. NetHide: Secure and practical network topology obfuscation[C] Proc of the 27th USENIX Security Symposium (USENIX Security 18). Berkeley, CA: USENIX Association, 2018: 693709[21]Aydeger A, Saputro N, Akkaya K. Utilizing NFV for effective moving target defense against link flooding reconnaissance attacks[C] Proc of the 2018 IEEE Military Communications Conference (MILCOM). Piscataway, NJ: IEEE, 2018: 946951[22]Zhang Tao, Kuang Xiaohui, Zhou Zan, et al. An intelligent route mutation mechanism against mixed attack based on security awareness[C] Proc of the 2019 IEEE Global Communications Conference(GLOBECOM). Piscataway, NJ: IEEE, 2019: 16[23]Ding Xuyang, Xiao Feng, Zhou Man, et al. Active link obfuscation to thwart linkflooding attacks for Internet of things[C] Proc of the 19th Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom). Piscataway, NJ: IEEE, 2020: 217224[24]Liu Yaqun, Zhao Jinlong, Zhang Guomin, et al. NetObfu: A lightweight and efficient network topology obfuscation defense scheme[J]. Computers & Security, 2021, 110: 102447[25]Kim J, Nam J, Lee S, et al. BottleNet: Hiding network bottlenecks using SDNbased topology deception[J]. IEEE Trans on Information Forensics and Security, 2021, 16: 31383153[26]Hou Tao, Wang Tao, Zhuo Lu, et al. Combating adversarial network topology inference by proactive topology obfuscation[J]. IEEEACM Trans on Networking, 2021, 29(6): 27792792[27]Kim J, Marin E, Conti M, et al. EqualNet: A secure and practical defense for longterm network topology obfuscation[COL] Proc of the Network and Distributed Systems Security (NDSS) Symposium. 2022 [20240509]. https:www.ndsssymposium.orgwpcontentuploads2022154paper.pdf[28]Liu Yaqun, Xing Changyou, Zhang Guomin, et al. AntiTomo: Network topology obfuscation against adversarial tomographybased topology inference[J]. Computers & Security, 2022, 113: 102570[29]林洪秀, 邢长友, 刘亚群, 等. AntiMNT:一种对抗多源网络层析成像的拓扑混淆机制[J]. 计算机应用研究, 2023, 40(1): 257262[30]Barabási A L, Albert R. Emergence of scaling in random networks[J]. Science, 1999, 286(5439): 509512[31]Rasool R U, Wang H, Ashraf U, et al. A survey of link flooding attacks in software defined network ecosystems[J]. Journal of Network and Computer Applications, 2020, 172: 102803[32]王瀚洲, 周洺宇, 刘建伟, 等. 5G网络安全威胁发现及解决方法综述[J]. 信息安全研究, 2024, 10(4): 340346
|