作者: Seunghyun Yoon , Jin-Hee Cho , Dong Seong Kim , Terrence J. Moore , Frederica Free-Nelson
DOI: 10.1109/TNSM.2020.2987085
关键词: Electronic mail 、 Vulnerability (computing) 、 Computer network 、 Attack surface 、 Network topology 、 Host (network) 、 Testbed 、 Computer science 、 Software-defined networking 、 Complex network
摘要: … for a certain time interval at the SDN switches. • IP/Port shuffling: To transform the end hosts into untraceable moving targets, the SDN controller periodically reassigns vIP to the end …