[1] OKHRAVI H, HOBSON T, BIGELOW D, et al. Finding focus in the blur of moving-target techniques[J]. IEEE Security & Privacy, 2014, 12(2):16-26. [2] XU J, GUO P, ZHAO M, et al. Comparing different moving target defense techniques[C]//Proceedings of the 1st ACM Workshop on Moving Target Defense. New York:ACM, 2014:97-107. [3] 邬江兴. 网络空间拟态防御研究[J]. 信息安全学报, 2016, 1(4):1-10.(WU J X. Research on cyber mimic defense[J]. Journal of Cyber Security, 2016, 1(4):1-10.) [4] 王蒙蒙,刘建伟,陈杰,等.软件定义网络:安全模型、机制及研究进展[J].软件学报,2016,27(4):969-992. (WANG M M, LIU J W, CHEN J, et al. Software defined networking:security model, threats and mechanism[J].Journal of Software, 2016, 27(4):969-992.) [5] KREUTZ D, RAMOS F M V, VERISSIMO P. Towards secure and dependable software-defined networks[C]//Proceedings of the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. New York:ACM, 2013:55-60. [6] 刘文懋, 裘晓峰, 陈鹏程,等. 面向SDN环境的软件定义安全架构[J]. 计算机科学与探索, 2015, 9(1):63-70. (LIU W M, QIU X F, CHEN P C, et al. SDN oriented software-defined security architecture[J]. Journal of Frontiers of Computer Science and Technology, 2015, 9(1):63-70.) [7] VAN RENESSE R, SCHNEIDER F B. Chain replication for supporting high throughput and availability[C]//Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation. Berkeley:USENIX Association, 2004:7. [8] SPALLA E S, MAFIOLETTI D R, LIBERATO A B, et al. AR2C2:actively replicated controllers for SDN resilient control plane[C]//Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium. Piscataway, NJ:IEEE, 2016:189-196. [9] 黄亮, 姜帆, 荀浩,等. 面向软件定义网络的入侵容忍控制器架构及实现[J]. 计算机应用, 2015, 35(12):3429-3436. (HUANG L, JIANG F, XUN H, et al. Software-defined networking-oriented intrusion tolerance controller architecture and its implementation[J]. Journal of Computer Applications, 2015, 35(12):3429-3436.) [10] 薛聪, 马存庆, 刘宗斌,等. 一种安全SDN控制器架构设计[J]. 信息网络安全, 2014(9):34-38. (XUE C, MA C Q, LIU Z B, et al. Design of secure SDN controller architecture[J]. Netinfo Security, 2014(9):34-38.) [11] ELDEFRAWY K, KACZMAREK T. Byzantine fault tolerant Software-Defined Networking (SDN) controllers[C]//Proceedings of the 2016 IEEE 40th Annual Computers Software and Applications Conference. Piscataway:IEEE, 2016:208-213. [12] LI H, LI P, GUO S, et al. Byzantine-resilient secure software-defined networks with multiple controllers in cloud[J]. IEEE Transactions on Cloud Computing, 2015, 2(4):436-447. [13] DIXIT A, HAO F, MUKHERJEE S, et al. Towards an elastic distributed SDN controller[J]. ACM SIGCOMM Computer Communication Review, 2013, 43(4):7-12. [14] WANG T, LIU F, GUO J, et al. Dynamic SDN controller assignment in data center networks:stable matching with transfers[C]//Proceedings of the 35th Annual IEEE International Conference on Computer Communications. Piscataway, NJ:IEEE, 2016:1-9. [15] KAMPANAKIS P, PERROS H, BEYENE T. SDN-based solutions for moving target defense network protection[C]//Proceedings of the 2014 IEEE 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks. Piscataway, NJ:IEEE,2014:1-6. [16] MACFARLAND D C, SHUE C A. The SDN shuffle:creating a moving-target defense using host-based software-defined networking[C]//Proceedings of the 2nd ACM Workshop on Moving Target Defense. New York:ACM, 2015:37-41. [17] DUNLOP M, GROAT S, URBANSKI W, et al. MT6D:a moving target IPv6 defense[C]//Proceedings of the 2011 Military Communications Conference. Piscataway:IEEE, 2011:1321-1326. [18] QI C, WU J, HU H, et al. An intensive security architecture with multi-controller for SDN[C]//Proceedings of the 2016 IEEE Conference on Computer Communications Workshops. Piscataway, NJ:IEEE, 2016:401-402. [19] QI C, WU J, HU H, et al. Dynamic-scheduling mechanism of controllers based on security policy in software-defined network[J]. Electronics Letters, 2016, 52(23):1918-1920. [20] WINTERROSE M L, CARTER K M, WAGNER N, et al. Adaptive attacker strategy development against moving target cyber defenses[EB/OL].[2017-05-01]. http://www.nealwagner.org/research/articles/1472_MITLincolnLabs_MSW2014.pdf. [21] CARTER K M, RIORDAN J F, OKHRAVI H. A game theoretic approach to strategy determination for dynamic platform defenses[C]//Proceedings of the 1st ACM Workshop on Moving Target Defense. New York:ACM, 2014:21-30. [22] 扈红超, 陈福才, 王禛鹏. 拟态防御DHR模型若干问题探讨和性能评估[J]. 信息安全学报, 2016, 1(4):40-51. (HU H C, CHEN F C, WANG Z P. Performance evaluations on DHR for cyberspace mimic defense[J]. Journal of Cyber Security, 2016, 1(4):40-51.) [23] HU Y, WANG W, GONG X, et al. On reliability-optimized controller placement for software-defined networks[J]. Communications China, 2014, 11(2):38-54. |