[1] 中国信息通信研究院.2016年云计算白皮书[R].北京:中国信息通信研究院,2016.(China Academy of Information and Communications Technology. 2016 Cloud Computing White Paper[R]. Beijing:China Academy of Information and Communications Technology, 2016.) [2] SINGER P W, FRIEDMAN A. Cybersecurity and Cyberwar:What Everyone Needs to Know[M]. Oxford:Oxford University Press, 2014:12-45. [3] BUI T. Analysis of docker security[EB/OL].[2017-04-20]. https://www.researchgate.net/publication/270906436_Analysis_of_Docker_Security. [4] CHUNG C J, KHATKAR P, XING T Y, et al. NICE:network intrusion detection and countermeasure selection in virtual network systems[J]. IEEE Transactions on Dependable and Secure Computing, 2013, 10(4):198-211. [5] XU H, CHEN X, ZHOU J M, et al. Research on basic problems of cognitive network intrusion prevention[C]//Proceedings of the 2013 Ninth International Conference on Computational Intelligence and Security. Washington, DC:IEEE Computer Society, 2013:514-517. [6] MADAN B B, GOŠEVA-POPSTOJANOVA K, VAIDYANATHAN K, et al. A method for modeling and quantifying the security attributes of intrusion tolerant systems[J]. Performance Evaluation, 2004, 56(1/2/3/4):167-186. [7] OKHRAVI H, HOBSON T, BIGELOW D, et al. Finding focus in the blur of moving-target techniques[J]. IEEE Security & Privacy, 2014, 12(2):16-26. [8] AZAB M, MOKHTAR B, ABED A S, et al. Toward smart moving target defense for Linux container resiliency[C]//Proceedings of the 2016 IEEE 41st Conference on Local Computer Networks. Piscataway, NJ:IEEE, 2016:619-622. [9] 仝青,张铮,张为华,等.拟态防御Web服务器设计与实现[J].软件学报,2017,28(4):883-897.(TONG Q, ZHANG Z, ZHANG W H, et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017, 28(4):883-897.) [10] BANGALORE A K, SOOD A K. Securing Web servers using Self Cleansing Intrusion Tolerance (SCIT)[C]//Proceedings of the 2009 Second International Conference on Dependability. Piscataway, NJ:IEEE, 2009:60-65. [11] BIEDERMAN E W. Multiple instances of the global Linux namespaces[EB/OL].[2017-05-06]. http://www.landley.net/kdocs/ols/2006/ols2006v1-pages-101-112.pdf. [12] ROSEN R. Linux containers and the future cloud[J]. Linux Journal, 2014, 2014(240):Article No. 3. [13] BABAR M A, RAMSEY B. Understanding container isolation mechanisms for building security-sensitive private cloud[R]. Adelaide, Australia:University of Adelaide, Centre for Research on Engineering Software Technologies, 2017. [14] DUA R, RAJA A R, KAKADIA D. Virtualization vs containerization to support PaaS[C]//Proceedings of the 2014 IEEE International Conference on Cloud Engineering. Piscataway, NJ:IEEE, 2014:610-614. [15] TANENBAUM A S, VAN STEEN M. Distributed Systems:Principles and Paradigms[M]. 2nd ed. Upper Saddle River, NJ:Prentice-Hall, 2007:545-585. [16] CARLSON J L. Redis in Action[M]. Greenwich, CT:Manning Publications, 2013:90-110. |