参考文献
[1]奇安信科技集团股份有限公司. 全球高级持续性威胁(APT)2021年中报告[EBOL]. [20220927]. https:www.qianxin.comthreatreportdetail?report_id=151[2]三六零安全科技股份有限公司. 2021年上半年全球高级持续性威胁(APT)研究报告[EBOL]. 2021 [20220927]. https:cert.360.cnreportdetail?id=6c9a1b56e4ceb84a8a b9e96044429adc[3]三六零安全科技股份有限公司. 2020全球高级持续性威胁APT研究报告[EBOL]. 2021 [20220927]. https:www.360.cnn11878.html[4]李静, 郭永和, 程杰, 等, 互联网未知威胁监测及应用技术研究[J]. 网络安全技术与应用, 2017 (3): 3537[5]郝龙. 基于黑客行为的Linux系统入侵排查方法[P]. 中国专利, CN112702360A, 20210423[6]刘雪花, 丁丽萍, 郑涛, 等.面向网络取证的网络攻击追踪溯源技术分析[J]. 软件学报, 2021, 32(1): 194217[7]李智宏, 王瑶.一种基于时间序列的入侵攻击路径溯源算法及实践[J]. 科技创新导报, 2020, 17(15): 152155[8]祝世雄, 陈周国, 张小松, 等. 网络攻击追踪溯源[M]. 北京: 国防工业出版社, 2015: 102131[9]丁丽萍, 刘文懋, 裘晓峰, 等. 云计算环境下的恶意行为检测、响应与取证技术研究[ROL]. 2018 [20220927]. https:www.is.cas.cnztz20162017xsnh2017nhhb2s202008wo20200825518164275676.pdf[10]陈瑞东, 张小松, 牛伟纳, 等. APT攻击检测与反制技术体系的研究[J]. 电子科技大学学报, 2019, 48(6): 870879[11]邓嘉兴. 论网络攻击反制技术[J]. 电脑编程技巧与维护, 2021 (10): 174176[12]谢一兵. 网络安全攻防演练成果分析[J]. 网络安全和信息化, 2022 (5): 122125[13]祝世雄. 网络攻击追踪溯源[M]. 北京: 国防工业出版社, 2015[14]Singh K, Singh P, Kumar K. A systematic review of IP traceback schemes for denial of service attacks[J]. Computers & Security, 2016, 56: 111139[15]Han D Z, Pan Nn, Li Kc. A traceable and revocable ciphertextpolicy attributebased encryption scheme based on privacy protection[J]. IEEE Trans on Dependable and Secure Computing, 2020, 19: 316327[16]Durmeric Z, Wustroow E, Halderman J A. ZMap: Fast internet wide scanning and its security applications[C] Proc of the 22nd USENIX Conf on Security Symp. Berkeley, CA: USENIX Association, 2013: 605620[17]Jafarian J H H, Alshaer E, Duan Q. An effective address mutation approach for disrupting reconnaissance attacks[J]. IEEE Trans on Information Forensics and Security, 2015, 10(12): 25622577[18]Aydeger A, Saputro N, Akkaya K. Utilizing NFV for effective moving target defense against link flooding reconnaissance attacks[C] Proc of 2018 IEEE Military Communications Conf(MILCOM 2018). Piscataway, NJ: IEEE, 2018: 946951[19]Hong J B, Yoon S, Llm H, et al. Optimal network reconfiguration for software defined networks usingshuffle based online MTD[C] Proc of the 36th IEEE Symp on Reliable Distributed Systems (SRDS ). Piscataway, NJ: IEEE, 2017: 234243[20]Achleitner S, La Porta T F, Mcdaniel P, et al. Deceiving network reconnaissance using SDNbased virtual topologies[J]. IEEE Trans on Network and Service Management, 2017, 14(4): 10981112
|