네트워크 주소 변이 기반 Moving Target Defense 연구 동향 |
Woo, Samuel
(한국전자통신연구원 초연결통신연구소 정보보호연구본부 지능보안연구그룹)
Park, Kyungmin (한국전자통신연구원 초연결통신연구소 정보보호연구본부 지능보안연구그룹) Moon, Daesung (한국전자통신연구원 초연결통신연구소 정보보호연구본부 지능보안연구그룹) Kim, Ikkyun (한국전자통신연구원 초연결통신연구소 정보보호연구본부 지능보안연구그룹) |
1 | Martin, Lockheed. "Cyber Kill Chain." Available: http://cyber.lockheedmartin.com/hubfs/Gainingthe AdvantageCyberKillChain.pdf, 2014 |
2 | Cai, Gui-lin, et al, "Moving target defense: state of the art and characteristics," Frontiers of Information Technology & Elec-tronic Engineering, pp. 1122-1153, 2016. |
3 | Hamed, et al. "Finding focus in the blur of moving-target techniques." IEEE Security & Privacy pp. 16-26, 2014. |
4 | D. Kewley, R. Fink, J. Lowry and M. Dean, "Dynamic Aproaches to Thwart Adversary Inteligence Gathering," Procedings of the DARPA Information Survivabilty Conference and Expositon, p. 176-185, 2001. |
5 | Yackoski, Justin, et al. "A self-shielding dynamic network architecture." Military communications conference, 2011-MILCOM 2011. IEEE, 2011. |
6 | Jafarian, Jafar Haadi, Ehab Al-Shaer, and Qi Duan. "Openflow random host mutation: transparent moving target defense using software defined networking." Workshop on Hot topics in software defined networks. ACM, 2012. |
7 | Jafarian, Jafar Haadi H., Ehab Al-Shaer, and Qi Duan. "Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers." Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014. |
8 | J. H. Jafarian, E. Al-Shaer and Q. Duan, "An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks," IEEE Transactions on Information Forensics, vol.10, no.12, pp. 2562-2577, August 2015. DOI |
9 | J. Sun and K. Sun, "DESIR: Decoy-enhanced seamless IP randomization," Proceedings of the IEEE ONFOCOM, 2016. |
10 | Dunlop, Matthew, et al, "Mt6d: A moving target ipv6 defense,"IEEE Military Communications Conference, 2011. |
11 | Luo, Yue-Bin, et al. "RPAH: Random port and address hopping for thwarting internal and external adversaries." Trustcom/BigDataSE/ISPA, Vol. 1, 2015. |
12 | K.M.Park, S.Woo, D.S.Moon, and I.K.Kim, "Trends in Network Address Moving Technology," ETRI Electronics and Telecommunication Trends, Vol 32, 2017 |
13 | K.M.Park, S.Woo, D.S.Moon, and H. Choi, "Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat", Symmetry, 2018 |
14 | Zhao, Zheng, Fenlin Liu, and Daofu Gong, "An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting At-tacks," Security and Communication Networks, 2017. |
15 | M. Atighetchi, P. Pal, F. Webber, and C. Jones, "Adaptive Use of Network-Centric Mechanisms in Cyber-Defense," In Object-Oriented Real-Time Distributed Computing, Sixth IEEE International Symposium on (pp. 183-192). 2003 |
16 | S. Antonatos, P. Akritidis, E.P. Markatos, and K.G. Anagnostakis, "Defending against hitlist worms using network address space randomization," Computer Networks, 51 (pp. 3471-3490) 2007. DOI |
17 | J. H. Jafarian, A. Niakanlahiji, E. Al-Shaer, and Q. Duan, "Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers," Proceedings of the 2016 ACM Workshop on Moving Target Defense, (pp. 47-58) 2016 |