{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,5]],"date-time":"2024-08-05T09:53:57Z","timestamp":1722851637141},"reference-count":25,"publisher":"Zhejiang University Press","issue":"2","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Frontiers Inf Technol Electronic Eng"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1631\/fitee.1800516","type":"journal-article","created":{"date-parts":[[2019,3,19]],"date-time":"2019-03-19T07:06:03Z","timestamp":1552979163000},"page":"238-252","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Design and implementation of a novel enterprise network defense system bymaneuveringmulti-dimensional network properties"],"prefix":"10.1631","volume":"20","author":[{"given":"Yang","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-7806-2066","authenticated-orcid":false,"given":"Hong-chao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Guo-zhen","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2019,3,19]]},"reference":[{"key":"1349_CR1","volume-title":"A scalable, commodity data center network architecture. ACM SIGCOMM Conf on Data Communication","author":"M Al\u2013Fares","year":"2008","unstructured":"Al\u2013Fares M, Loukissas A, Vahdat A, 2008. A scalable, commodity data center network architecture. ACM SIGCOMM Conf on Data Communication, p.63\u201374. \n https:\/\/doi.org\/10.1145\/1402958.1402967"},{"issue":"12","key":"1349_CR2","doi-asserted-by":"publisher","first-page":"3471","DOI":"10.1016\/j.comnet.2007.02.006","volume":"51","author":"S Antonatos","year":"2007","unstructured":"Antonatos S, Akritidis P, Markatos EP, et al., 2007. Defending against hitlist worms using network address space randomization. Comput Netw, 51(12):3471\u20133490. \n https:\/\/doi.org\/10.1016\/j.comnet.2007.02.006","journal-title":"Comput Netw"},{"key":"1349_CR3","volume-title":"Adaptive use of network\u2013centric mechanisms in cyber\u2013defense. 6th IEEE Int Symp on Object\u2013Oriented Real\u2013Time Distributed Computing","author":"M Atighetchi","year":"2003","unstructured":"Atighetchi M, Pal P, Webber F, et al., 2003. Adaptive use of network\u2013centric mechanisms in cyber\u2013defense. 6th IEEE Int Symp on Object\u2013Oriented Real\u2013Time Distributed Computing, p.183\u2013192. \n https:\/\/doi.org\/10.1109\/ISORC.2003.1199253"},{"key":"1349_CR4","volume-title":"Analysis of network address shuffling as a moving target defense. IEEE Int Conf on Communications","author":"TE Carroll","year":"2014","unstructured":"Carroll TE, Crouse M, Fulp EW, et al., 2014. Analysis of network address shuffling as a moving target defense. IEEE Int Conf on Communications, p.701\u2013706. \n https:\/\/doi.org\/10.1109\/ICC.2014.6883401"},{"key":"1349_CR5","volume-title":"Efficient random route mutation considering flow and network constraints","author":"Q Duan","year":"2013","unstructured":"Duan Q, Al\u2013Shaer E, Jafarian H, 2013. Efficient random route mutation considering flow and network constraints. IEEE Conf on Communications and Network Security, p.260\u2013268. \n https:\/\/doi.org\/10.1109\/CNS.2013.6682715"},{"key":"1349_CR6","volume-title":"Liftoff: guide to duo deployment best practices","author":"Duo","year":"2018","unstructured":"Duo, 2018. Liftoff: guide to duo deployment best practices. \n https:\/\/duo.com\/assets\/pdf\/Duo-Liftoff-Guide.pdf\n \n [Accessed on Oct. 18, 2018]."},{"issue":"3","key":"1349_CR7","first-page":"38","volume":"42","author":"V Escobedo","year":"2017","unstructured":"Escobedo V, Beyer B, Saltonstall M, et al., 2017. Beyond\u2013Corp 5: the user experience. Login, 42(3):38\u201343.","journal-title":"Login"},{"key":"1349_CR8","volume-title":"Bring your own disclosure: analysing BYOD threats to corporate information","author":"DA Flores","year":"2016","unstructured":"Flores DA, Qazi F, Jhumka A, 2016. Bring your own disclosure: analysing BYOD threats to corporate information. IEEE Trustcom\/BigDataSE\/ISPA, p.1008\u20131015. \n https:\/\/doi.org\/10.1109\/TrustCom.2016.0169"},{"issue":"4","key":"1349_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/1594977.1592576","volume":"39","author":"A Greenberg","year":"2009","unstructured":"Greenberg A, Hamilton JR, Jain N, et al., 2009. Vl2: a scalable and flexible data center network. ACM SIGCOMM Comput Commun Rev, 39(4):51\u201362. \n https:\/\/doi.org\/10.1145\/1594977.1592576","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"6","key":"1349_CR10","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/JIOT.2017.2690522","volume":"4","author":"ZT Guan","year":"2017","unstructured":"Guan ZT, Li J, Wu LF, et al., 2017. Achieving efficient and secure data acquisition for cloud\u2013supported Internet of Things in smart grid. IEEE Internet Things J, 4(6):1934\u20131944. \n https:\/\/doi.org\/10.1109\/JIOT.2017.2690522","journal-title":"IEEE Internet Things J"},{"key":"1349_CR11","volume-title":"Intelligence\u2013driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains","author":"E Hutchins","year":"2011","unstructured":"Hutchins E, Cloppert M, Amin R, 2011. Intelligence\u2013driven computer network defense informed by analysis of adversary campaigns and intrusion kill chains. In: Ryan J (Ed.), Leading Issues in Information Warfare & Security Research. Academic Publishing International Limited, London, UK, p.80\u2013106."},{"key":"1349_CR12","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467","volume-title":"Openflow random host mutation: transparent moving target defense using software defined networking","author":"JH Jafarian","year":"2012","unstructured":"Jafarian JH, Al\u2013Shaer E, Duan Q, 2012. Openflow random host mutation: transparent moving target defense using software defined networking. 1st Workshop on Hot Topics in Software Defined Networks, p.127\u2013132. \n https:\/\/doi.org\/10.1145\/2342441.2342467"},{"key":"1349_CR13","volume-title":"Formal approach for route agility against persistent attackers. 18th European Symp on Research in Computer Security","author":"JH Jafarian","year":"2013","unstructured":"Jafarian JH, Al\u2013Shaer E, Duan Q, 2013. Formal approach for route agility against persistent attackers. 18th European Symp on Research in Computer Security, p.237\u2013254. \n https:\/\/doi.org\/10.1007\/978-3-642-40203-6_14"},{"issue":"12","key":"1349_CR14","doi-asserted-by":"publisher","first-page":"2562","DOI":"10.1109\/TIFS.2015.2467358","volume":"10","author":"JH Jafarian","year":"2015","unstructured":"Jafarian JH, Al\u2013Shaer E, Duan Q, 2015. An effective address mutation approach for disrupting reconnaissance attacks. IEEE Trans Inform Forensics Secur, 10(12):2562\u20132577. \n https:\/\/doi.org\/10.1109\/TIFS.2015.2467358","journal-title":"IEEE Trans Inform Forensics Secur"},{"key":"1349_CR15","volume-title":"Dynamic approaches to thwart adversary intelligence gathering. DARPA Information Survivability Conf and Exposition II","author":"D Kewley","year":"2001","unstructured":"Kewley D, Fink R, Lowry J, et al., 2001. Dynamic approaches to thwart adversary intelligence gathering. DARPA Information Survivability Conf and Exposition II, p.176\u2013185. \n https:\/\/doi.org\/10.1109\/DISCEX.2001.932214"},{"key":"1349_CR16","volume-title":"Build security into your network\u2019s DNA: the zero trust network architecture. Technical Report","author":"J Kindervag","year":"2010","unstructured":"Kindervag J, 2010. Build security into your network\u2019s DNA: the zero trust network architecture. Technical Report, Forrester Research. \n http:\/\/www.ndm.net\/firewall\/pdf\/palo_alto\/Forrester-Build-Security-Into-Your-Network.pdf\n \n [Accessed on Nov. 5, 2010]."},{"key":"1349_CR17","volume-title":"No more chewy centers: the zero-trust model of information security. Technical Report","author":"J Kindervag","year":"2016","unstructured":"Kindervag J, 2016. No more chewy centers: the zero-trust model of information security. Technical Report, Forrester Research. \n http:\/\/crystaltechnologies.com\/wp-content\/uploads\/2017\/12\/forrester-zero-trust-model-informationsecurity.pdf\n \n [Accessed on Mar. 23, 2016]."},{"issue":"3","key":"1349_CR18","first-page":"133","volume":"38","author":"C Lei","year":"2017","unstructured":"Lei C, Ma DH, Zhang HQ, et al., 2017. Network moving target defense technique based on optimal forwarding path migration. J Commun, 38(3):133\u2013143 (in Chinese). \n https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2017056","journal-title":"J Commun"},{"issue":"10","key":"1349_CR19","doi-asserted-by":"publisher","first-page":"4702","DOI":"10.1109\/TII.2018.2845844","volume":"14","author":"GL Li","year":"2018","unstructured":"Li GL, Wu J, Li JH, et al., 2018. Service popularity\u2013based smart resources partitioning for fog computing\u2013enabled industrial Internet of Things. IEEE Trans Ind Inform, 14(10):4702\u20134711. \n https:\/\/doi.org\/10.1109\/TII.2018.2845844","journal-title":"IEEE Trans Ind Inform"},{"issue":"5","key":"1349_CR20","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MITP.2012.93","volume":"14","author":"KW Miller","year":"2012","unstructured":"Miller KW, Voas J, Hurlburt GF, 2012. BYOD: security and privacy considerations. It Prof, 14(5):53\u201355. \n https:\/\/doi.org\/10.1109\/MITP.2012.93","journal-title":"It Prof"},{"issue":"3","key":"1349_CR21","first-page":"49","volume":"42","author":"J Peck","year":"2017","unstructured":"Peck J, Beyer B, Beske C, et al., 2017. Migrating to BeyondCorp: maintaining productivity while improving security. Login, 42(3):49\u201355.","journal-title":"Login"},{"key":"1349_CR22","volume-title":"FRVM: flexible random virtual IP multiplexing in software\u2013defined networks. 17th IEEE Int Conf on Trust","author":"DP Sharma","year":"2018","unstructured":"Sharma DP, Kim DS, Yoon S, et al., 2018. FRVM: flexible random virtual IP multiplexing in software\u2013defined networks. 17th IEEE Int Conf on Trust, Security, and Privacy in Computing and Communications\/12th IEEE Int Conf on Big Data Science and Engineering, p.579\u2013587. \n https:\/\/doi.org\/10.1109\/trustcom\/bigdatase.2018.00088"},{"key":"1349_CR23","volume-title":"Path hopping based on reverse AODV for security. 9th Asia\u2013Pacific Int Conf on Network Operations and Management: Management of Convergence Networks and Services","author":"E Talipov","year":"2006","unstructured":"Talipov E, Jin DX, Jung J, et al., 2006. Path hopping based on reverse AODV for security. 9th Asia\u2013Pacific Int Conf on Network Operations and Management: Management of Convergence Networks and Services, p.574\u2013577. \n https:\/\/doi.org\/10.1007\/11876601_69"},{"issue":"1","key":"1349_CR24","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TNSM.2018.2799000","volume":"15","author":"J Wu","year":"2018","unstructured":"Wu J, Dong MX, Ota K, et al., 2018. Big data analysis\u2013based secure cluster management for optimized control plane in software\u2013defined networks. IEEE Trans Netw Serv Manag, 15(1):27\u201338. \n https:\/\/doi.org\/10.1109\/TNSM.2018.2799000","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"1349_CR25","first-page":"4651395","volume":"2017","author":"Y Zhou","year":"2017","unstructured":"Zhou Y, Ni W, Zheng KF, et al., 2017. Scalable node\u2013centric route mutation for defense of large\u2013scale softwaredefined networks. Secur Commun Netw, 2017:4651395. \n https:\/\/doi.org\/10.1155\/2017\/4651395","journal-title":"Secur Commun Netw"}],"container-title":["Frontiers of Information Technology & Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1800516.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1631\/FITEE.1800516\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1800516.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T00:06:26Z","timestamp":1584489986000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1631\/FITEE.1800516"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["1349"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1800516","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2]]},"assertion":[{"value":"30 August 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}