{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,1]],"date-time":"2024-09-01T05:06:11Z","timestamp":1725167171520},"reference-count":52,"publisher":"Institution of Engineering and Technology (IET)","issue":"3","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61309020"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Information Security"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1049\/iet-ifs.2017.0086","type":"journal-article","created":{"date-parts":[[2017,12,14]],"date-time":"2017-12-14T02:19:57Z","timestamp":1513217997000},"page":"226-237","source":"Crossref","is-referenced-by-count":60,"title":["Mimic defense: a designed\u2010in cybersecurity defense framework"],"prefix":"10.1049","volume":"12","author":[{"given":"Hongchao","family":"Hu","sequence":"first","affiliation":[{"name":"National Digital Switching System Engineering & Technological R&D CenterZhengzhouHenan450002People's Republic of China"}]},{"given":"Jiangxing","family":"Wu","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering & Technological R&D CenterZhengzhouHenan450002People's Republic of China"}]},{"given":"Zhenpeng","family":"Wang","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering & Technological R&D CenterZhengzhouHenan450002People's Republic of China"}]},{"given":"Guozhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering & Technological R&D CenterZhengzhouHenan450002People's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2018,5]]},"reference":[{"key":"e_1_2_11_2_2","unstructured":"National Science and Technology Council Federal Cybersecurity Research and Development Strategic Plan February 2016"},{"key":"e_1_2_11_3_2","unstructured":"National Science and Technology Council Trustworthy Cyberspace: \u2018Strategic Plan for The Federal Cybersecurity Research and Development Program\u2019 December 2011"},{"key":"e_1_2_11_4_2","unstructured":"National Institute of Standards and Technology Guide to Intrusion Detection and Prevention Systems (IDPS) February 2007"},{"key":"e_1_2_11_5_2","unstructured":"Spitzner L.: \u2018Honeypots: catching the insider threat\u2019.Computer Security Applications Conf. 2003 pp.170\u2013179"},{"key":"e_1_2_11_6_2","doi-asserted-by":"crossref","unstructured":"Jana S. Porter D.E. Shmatikov V.: \u2018Txbox: building secure efficient sandboxes with system transactions\u2019.2011 IEEE Symp. Security and Privacy May 22\u2013252011 pp.329\u2013344","DOI":"10.1109\/SP.2011.33"},{"key":"e_1_2_11_7_2","unstructured":"Wang F. Upppalli R.: \u2018SITAR a scalable intrusion\u2010tolerant architecture for distributed services\u2019.Proceedings of the 2001 IEEE Workshop on Information Assurance and Security West Point NY 2001 pp.38\u201345"},{"key":"e_1_2_11_8_2","doi-asserted-by":"crossref","unstructured":"Dunlop M. Groat S. Urbanski W.et al: \u2018Mt6da moving target ipv6 defense\u2019.Military Communications Conf. 2011\u2010Milcom 2011. IEEE 2011 pp.1321\u20131326","DOI":"10.1109\/MILCOM.2011.6127486"},{"key":"e_1_2_11_9_2","doi-asserted-by":"crossref","unstructured":"Jafarian J.H. Al\u2010Shaer E. Duan Q.: \u2018OpenFlow random host mutation: transparent moving target defense using software defined networking\u2019.Proc. First Workshop on Hot Topics in Software Defined Networks. Association for Computing Machinery 2012 pp.127\u2013132","DOI":"10.1145\/2342441.2342467"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2467358"},{"key":"e_1_2_11_11_2","doi-asserted-by":"crossref","unstructured":"Jafarian J.H. Al\u2010Shaer E. Duan Q.: \u2018Adversary\u2010aware IP address randomization for proactive agility against sophisticated attackers\u2019.2015 IEEE Conf. Computer Communications (INFOCOM) 2015 pp.738\u2013746","DOI":"10.1109\/INFOCOM.2015.7218443"},{"key":"e_1_2_11_12_2","doi-asserted-by":"crossref","unstructured":"Luo Y.B. Wang B.S. Cai G.L.: \u2018Effectiveness of port hopping as a moving target defense\u2019.2014 7th Int. Conf. Security Technology (SecTech) 2014 pp.7\u201310","DOI":"10.1109\/SecTech.2014.9"},{"key":"e_1_2_11_13_2","doi-asserted-by":"crossref","unstructured":"Al\u2010Shaer E. Marrero W. El\u2010Atway A.et al: \u2018Network configuration in a box: towards end\u2010to\u2010end verification of network reachability and security\u2019.Proc. 17th Int. Conf. Network Communications and Protocol (ICNP'09) 2009 Princeton pp.123\u2013132","DOI":"10.1109\/ICNP.2009.5339690"},{"key":"e_1_2_11_14_2","first-page":"85","volume-title":"Moving target defense against cross\u2010site scripting attacks (position paper)","author":"Portner J.","year":"2014"},{"key":"e_1_2_11_15_2","doi-asserted-by":"crossref","unstructured":"Shacham H. Page M. Pfaff B.et al: \u2018On the effectiveness of address\u2010space randomization\u2019.Association for Computing Machinery Conf. Computer and Communications Security (CCS) CCS \u201904 Association for Computing Machinery New York NY USA 2004 pp.298\u2013307","DOI":"10.1145\/1030083.1030124"},{"issue":"3","key":"e_1_2_11_16_2","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1109\/TDSC.2008.58","article-title":"On the general applicability of instruction\u2010set randomization","volume":"7","author":"Boyd S.W.","year":"2010","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"e_1_2_11_17_2","doi-asserted-by":"crossref","unstructured":"Nguyen\u2010Tuong A. Evans D. Knight J.C.et al: \u2018Security through redundant data diversity\u2019.IEEE\/IFPF Int. Conf. Dependable Systems and Networks June2008","DOI":"10.1109\/DSN.2008.4630087"},{"issue":"2","key":"e_1_2_11_18_2","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s11036-012-0392-0","article-title":"Software behavior encryption for moving target defense","volume":"18","author":"Azab M.","year":"2013","journal-title":"Mobile Netw. Appl."},{"key":"e_1_2_11_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.60"},{"key":"e_1_2_11_20_2","doi-asserted-by":"crossref","unstructured":"Zhuang R. DeLoach S.A. Ou X.: \u2018A model for analyzing the effect of moving target defenses on enterprise networks\u2019.Proc. 9th Annual Cyber and Information Security Research Conf. Association for Computing Machinery 2014 pp.73\u201376","DOI":"10.1145\/2602087.2602088"},{"key":"e_1_2_11_21_2","doi-asserted-by":"crossref","unstructured":"Zhuang R. DeLoach S.A. Ou X.: \u2018Towards a theory of moving target defense\u2019.Proc. First ACM Workshop on Moving Target Defense. ACM 2014 pp.31\u201340","DOI":"10.1145\/2663474.2663479"},{"key":"e_1_2_11_22_2","doi-asserted-by":"crossref","unstructured":"Zhuang R. Bardas A.G. DeLoach S.A.et al: \u2018A theory of cyber attacks\u2019.Proc. Second ACM Workshop on Moving Target Defense. ACM 2015","DOI":"10.1145\/2808475.2808478"},{"key":"e_1_2_11_23_2","doi-asserted-by":"crossref","unstructured":"Carter K.M. Riordan J.F. Okhravi H.: \u2018A game theoretic approach to strategy determination for dynamic platform defenses\u2019.Proc. First ACM Workshop on Moving Target Defense. ACM 2014 pp.21\u201330","DOI":"10.1145\/2663474.2663478"},{"key":"e_1_2_11_24_2","doi-asserted-by":"crossref","unstructured":"Prakash A. Wellman M.P.: \u2018Empirical game\u2010theoretic analysis for moving target defense\u2019.Proc. Second ACM Workshop on Moving Target Defense. ACM 2015 pp.57\u201365","DOI":"10.1145\/2808475.2808483"},{"issue":"11","key":"e_1_2_11_25_2","first-page":"1545","article-title":"Assessing the effectiveness of moving target defenses using security models","volume":"10","author":"Hong J.B.","year":"2015","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"e_1_2_11_26_2","doi-asserted-by":"crossref","unstructured":"Cybenko G. Hughes J.: \u2018No free lunch in cyber security\u2019.Proc. First ACM Workshop on Moving Target Defense. ACM 2014 pp.1\u201312","DOI":"10.1145\/2663474.2663475"},{"key":"e_1_2_11_27_2","doi-asserted-by":"crossref","unstructured":"Han Y. Lu W. Xu S.: \u2018Characterizing the power of moving target defense via cyber epidemic dynamics HotSoS'14\u2019.Proc. 2014 Symp. Bootcamp on the Science of Security Raleigh NC USA April 08\u2013092014","DOI":"10.1145\/2600176.2600180"},{"key":"e_1_2_11_28_2","doi-asserted-by":"crossref","unstructured":"Kc G. Keromytis A. Prevelakis V.: \u2018Countering code\u2010injection attacks with instruction\u2010set randomization\u2019.Proc. Association for Computing Machinery Conf. Computer and Communications Security'03 Washington DC USA October 27\u201330 2003","DOI":"10.1145\/948109.948146"},{"key":"e_1_2_11_29_2","doi-asserted-by":"crossref","unstructured":"Barrantes E. Ackley D. Palmer T.et al: \u2018Randomized instruction set emulation to disrupt binary code injection attacks\u2019.Proc. Association for Computing Machinery Conf. Computer and Communications Security'03 Washington DC USA October 27\u201330 2003pp.281\u2013289","DOI":"10.1145\/948109.948147"},{"key":"e_1_2_11_30_2","unstructured":"Giuffrida C. Kuijsten A. Tanenbaum A.: \u2018Enhanced operating system security through efficient and fine\u2010grained address space randomization\u2019.Proc. USENIX Security'12 Bellevue WA August 08\u201310 2012"},{"key":"e_1_2_11_31_2","doi-asserted-by":"crossref","unstructured":"Homescu A. Brunthaler S. Larsen P.et al: \u2018Librando: transparent code randomization for just\u2010in\u2010time compilers\u2019.Proc. Association for Computing Machinery Conf. Computer and Communications Security'13 Berlin Germany November 4\u20138 2013","DOI":"10.1145\/2508859.2516675"},{"key":"e_1_2_11_32_2","volume-title":"Moving target defense","author":"Jackson T.","year":"2013"},{"key":"e_1_2_11_33_2","unstructured":"Kiriansky V. Bruening D. Amarasinghe S.: \u2018Secure execution via program shepherding\u2019.Proc. USENIX Security'02 San Francisco California August 5\u20139 2002 pp.191\u2013206"},{"key":"e_1_2_11_34_2","doi-asserted-by":"crossref","unstructured":"Luk C. Cohn R. Muth R.et al: \u2018Pin: building customized program analysis tools with dynamic instrumentation\u2019.Proc. PLDI'05 Chicago Illinois USA June 12\u201315 2005 pp.190\u2013200","DOI":"10.1145\/1064978.1065034"},{"key":"e_1_2_11_35_2","doi-asserted-by":"crossref","unstructured":"Nethercote N. Seward J.: \u2018Valgrind: a framework for heavyweight dynamic binary instrumentation\u2019.PLDI'07 San Diego California June 11\u201313 2007 pp.89\u2013100","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_2_11_36_2","doi-asserted-by":"crossref","unstructured":"Pappas V. Polychronakis M. Keromytis A.: \u2018Smashing the gadgets: hindering return\u2010oriented programming using in\u2010place code randomization\u2019.IEEE Symp. Security and Privacy'12 San Francisco CA May 20\u201323 2012","DOI":"10.1109\/SP.2012.41"},{"key":"e_1_2_11_37_2","doi-asserted-by":"crossref","unstructured":"Wartell R. Mohan V. Hamlen K.et al: \u2018Binary stirring: self\u2010randomizing instruction addresses of legacy x86 binary code\u2019.Association for Computing Machinery Conf. Computer and Communications Security'12 Raleigh North Carolina October 16\u201318 2012 pp.157\u2013168","DOI":"10.1145\/2382196.2382216"},{"key":"e_1_2_11_38_2","unstructured":"The PaX Team.Available athttp:\/\/pax.grsecurity.net\/docs\/aslr.txt"},{"key":"e_1_2_11_39_2","unstructured":"Bhatkar S. DuVarney D. Sekar R.: \u2018Address obfuscation: an efficient approach to combat a board range of memory error exploits\u2019.USENIX Security Symp. 2003 Washington DC August 04\u201308 2003 pp.8\u20138"},{"key":"e_1_2_11_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"e_1_2_11_41_2","first-page":"1","volume-title":"CRYPTO'89","author":"Desmedt Y."},{"key":"e_1_2_11_42_2","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret?","author":"Shamir A.","year":"1979","journal-title":"Commun. ACM"},{"key":"e_1_2_11_43_2","doi-asserted-by":"crossref","unstructured":"Gillani F. Al\u2010Shaer E. Lo S.et al: \u2018Agile virtualized infrastructure to proactively defend against cyber attacks\u2019.INFOCOM 2015 Association for Computing Machinery 2015","DOI":"10.1109\/INFOCOM.2015.7218442"},{"key":"e_1_2_11_44_2","doi-asserted-by":"crossref","unstructured":"Vikram S. Yang C. Gu G.: \u2018Nomad: towards non\u2010intrusive moving\u2010target defense against web bots\u2019.2013 IEEE Conf. Communications and Network Security (CNS) 2013 pp.55\u201363","DOI":"10.1109\/CNS.2013.6682692"},{"key":"e_1_2_11_45_2","doi-asserted-by":"crossref","unstructured":"Peng W. Li F. Huang C.T.et al: \u2018A moving\u2010target defense strategy for cloud\u2010based services with heterogeneous and dynamic attack surfaces\u2019.2014 IEEE Int. Conf. Communications (ICC) 2014 pp.804\u2013809","DOI":"10.1109\/ICC.2014.6883418"},{"key":"e_1_2_11_46_2","unstructured":"Design Considerations in Boeing 777 Fly\u2010By\u2010Wire Computers Y. C. (Bob) Yeh Boeing Commercial Airplane Group"},{"key":"e_1_2_11_47_2","unstructured":"Triple\u2010Triple Redundant 777\u00a0Primary Flight Computer Y. C. (Bob) Yeh"},{"key":"e_1_2_11_48_2","unstructured":"Vissicchio S. Cittadini L. Bonaventure O.et al: \u2018On the co\u2010existence of distributed and centralized routing control\u2010planes\u2019"},{"key":"e_1_2_11_49_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-7970-4"},{"key":"e_1_2_11_50_2","unstructured":"Moy J.:\u2018OSPF Version 2 RFC2328\u2019. Available athttps:\/\/tools.ietf.org\/html\/rfc2328"},{"key":"e_1_2_11_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90054-9"},{"key":"e_1_2_11_52_2","unstructured":"Forrest S. Somayaji A. Ackley D.: \u2018Building diverse computer systems\u2019.Proc. HotOS\u2010VI"},{"key":"e_1_2_11_53_2","unstructured":"ZTE. ZXR10\u00a0M6000\u2010S Carrier\u2010Class Router.Available athttp:\/\/wwwen.zte.com.cn\/en\/products\/bearer\/data_communication\/router_bmsg"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2017.0086","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ifs.2017.0086","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2017.0086","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,13]],"date-time":"2021-01-13T22:00:16Z","timestamp":1610575216000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ifs.2017.0086"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["10.1049\/iet-ifs.2017.0086"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs.2017.0086","archive":["Portico"],"relation":{},"ISSN":["1751-8717","1751-8717"],"issn-type":[{"value":"1751-8717","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}