Browse > Article

네트워크 주소 변이 기반 Moving Target Defense 연구 동향  

Woo, Samuel (한국전자통신연구원 초연결통신연구소 정보보호연구본부 지능보안연구그룹)
Park, Kyungmin (한국전자통신연구원 초연결통신연구소 정보보호연구본부 지능보안연구그룹)
Moon, Daesung (한국전자통신연구원 초연결통신연구소 정보보호연구본부 지능보안연구그룹)
Kim, Ikkyun (한국전자통신연구원 초연결통신연구소 정보보호연구본부 지능보안연구그룹)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 Martin, Lockheed. "Cyber Kill Chain." Available: http://cyber.lockheedmartin.com/hubfs/Gainingthe AdvantageCyberKillChain.pdf, 2014
2 Cai, Gui-lin, et al, "Moving target defense: state of the art and characteristics," Frontiers of Information Technology & Elec-tronic Engineering, pp. 1122-1153, 2016.
3 Hamed, et al. "Finding focus in the blur of moving-target techniques." IEEE Security & Privacy pp. 16-26, 2014.
4 D. Kewley, R. Fink, J. Lowry and M. Dean, "Dynamic Aproaches to Thwart Adversary Inteligence Gathering," Procedings of the DARPA Information Survivabilty Conference and Expositon, p. 176-185, 2001.
5 Yackoski, Justin, et al. "A self-shielding dynamic network architecture." Military communications conference, 2011-MILCOM 2011. IEEE, 2011.
6 Jafarian, Jafar Haadi, Ehab Al-Shaer, and Qi Duan. "Openflow random host mutation: transparent moving target defense using software defined networking." Workshop on Hot topics in software defined networks. ACM, 2012.
7 Jafarian, Jafar Haadi H., Ehab Al-Shaer, and Qi Duan. "Spatio-temporal address mutation for proactive cyber agility against sophisticated attackers." Proceedings of the First ACM Workshop on Moving Target Defense. ACM, 2014.
8 J. H. Jafarian, E. Al-Shaer and Q. Duan, "An Effective Address Mutation Approach for Disrupting Reconnaissance Attacks," IEEE Transactions on Information Forensics, vol.10, no.12, pp. 2562-2577, August 2015.   DOI
9 J. Sun and K. Sun, "DESIR: Decoy-enhanced seamless IP randomization," Proceedings of the IEEE ONFOCOM, 2016.
10 Dunlop, Matthew, et al, "Mt6d: A moving target ipv6 defense,"IEEE Military Communications Conference, 2011.
11 Luo, Yue-Bin, et al. "RPAH: Random port and address hopping for thwarting internal and external adversaries." Trustcom/BigDataSE/ISPA, Vol. 1, 2015.
12 K.M.Park, S.Woo, D.S.Moon, and I.K.Kim, "Trends in Network Address Moving Technology," ETRI Electronics and Telecommunication Trends, Vol 32, 2017
13 K.M.Park, S.Woo, D.S.Moon, and H. Choi, "Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat", Symmetry, 2018
14 Zhao, Zheng, Fenlin Liu, and Daofu Gong, "An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting At-tacks," Security and Communication Networks, 2017.
15 M. Atighetchi, P. Pal, F. Webber, and C. Jones, "Adaptive Use of Network-Centric Mechanisms in Cyber-Defense," In Object-Oriented Real-Time Distributed Computing, Sixth IEEE International Symposium on (pp. 183-192). 2003
16 S. Antonatos, P. Akritidis, E.P. Markatos, and K.G. Anagnostakis, "Defending against hitlist worms using network address space randomization," Computer Networks, 51 (pp. 3471-3490) 2007.   DOI
17 J. H. Jafarian, A. Niakanlahiji, E. Al-Shaer, and Q. Duan, "Multi-dimensional Host Identity Anonymization for Defeating Skilled Attackers," Proceedings of the 2016 ACM Workshop on Moving Target Defense, (pp. 47-58) 2016