[1] 新华社.中共中央办公厅国务院办公厅印发《推进互联网协议第六版(IPv6)规模部署行动计划》[EB/OL].[2017-11-26]. http://www.gov.cn/zhengce/2017-11/26/content_5242389.htm.(Xinhua News Agency. Scale deployment action plan for advancing Internet Protocol (IPv6) issued by the State Council General Office and General Office of the CPC Central Committee, 6th ed[EB/OL].[2017-11-26]. http://www.gov.cn/zhengce/2017-11/26/content_5242389.htm.) [2] JOSEPH D.深入解析IPv6[M].汪海霖,译.3版.北京:人民邮电出版社,2014:10-13.(JOSEPH D. Understanding IPv6[M]. WANG H L, translated. 3rd ed. Beijing:Posts & Telecom Press, 2014:10-13.) [3] JAJODIA S, GHOSH A K, SWARUP V. et al. Moving Target Defense:Creating Asymmetric Uncertainty for Cyber Threats[M]. Berlin:Springer, 2011:20-25. [4] SIFALAKIS M, SCHMID S, HUTCHISON D. Network address hopping:a mechanism to enhance data protection for packet communications[C]//ICC 2005:Proceedings of the 2005 IEEE International Conference on Communications. Piscataway, NJ:IEEE, 2005:1518-1523. [5] CROSBY, SEAN, MARCO C, et al. A layered approach to understanding network dependencies on moving target defense mechanisms[C]//Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop. New York:ACM, 2013:36. [6] SHACHAM H, PAGE M, PFAFF B, et al. On the effectiveness of address-space randomization[C]//Proceedings of the 11th ACM Conference on Computer and Communications Security. New York:ACM, 2004:298-307. [7] BADISHI G, HERZBERG A, KEIDAR I, et al. An empirical study of denial of service mitigation techniques[C]//SRDS'08:Proceedings of the 2008 IEEE Symposium on Reliable Distributed Systems. Piscataway, NJ:IEEE, 2008:115-124. [8] JAFARIAN J H, AL-SHAER E, DUAN Q. OpenFlow random host mutation:transparent moving target defense using software defined networking[C]//Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks. New York:ACM, 2012:127-132. [9] AL-SHAER E, DUAN Q, JAFARIAN J H. Random host mutation for moving target defense[C]//Proceedings of the 2012 International Conference on Security and Privacy in Communication Networks. Berlin:Springer, 2012:310-327. [10] JAFARIAN J H, AL-SHAER E, DUAN Q. Spatio-temporal ad-dress mutation for proactive cyber agility against sophisticated attackers[C]//Proceedings of the 1st ACM Workshop on Moving Target Defense. New York:ACM, 2014:69-78. [11] LEE H C J, THING V L L. Port hopping for resilient networks[C]//Proceedings of the 60th Vehicular Technology conference. Piscataway, NJ:IEEE, 2004:3291-3295. [12] SIFALAKIS M, SCHMID S, HUTCHISON D. Network address hopping:a mechanism to enhance data protection for packet communications[C]//Proceedings of the 2005 IEEE International Conference on Communications. Piscataway, NJ:IEEE, 2005:1518-1523. [13] DUNLOP M, GROAT S, URBANSKI W, et al. MT6D:a moving target IPv6 defense[C]//Proceedings of the 2011 Military Communications Conference. Piscataway, NJ:IEEE, 2011:1321-1326. [14] 刘慧生,王振兴,郭毅.一种基于多穴跳变的IPv6主动防御模型[J].电子与信息学报,2012,34(7):1715-1720.(LIU H S, WANG Z X, GUO Y. An IPv6 proactive network defense model based on multi-homing hopping[J]. Journal of Electronics & Information Technology, 2012, 34(7):1715-1720.) |