A mutation-enabled proactive defense against service-oriented man-in-the-middle attack in kubernetes

T Ma, C Xu, S Yang, Y Huang, Q An… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
Kubernetes (K8s) has become a core technology for cloud-native applications. However, a
design flaw of the external IP in K8s leads to the service-oriented man-in-the-middle attack …

Addressless: A new internet server model to prevent network scanning

S Hao, R Liu, Z Weng, D Chang, C Bao, X Li - Plos one, 2021 - journals.plos.org
Eliminating unnecessary exposure is a principle of server security. The huge IPv6 address
space enhances security by making scanning infeasible, however, with recent advances of …

Polymorphic path transferring for secure flow delivery

R Zhang, X Li, Y Zhan - … on Internet and Information Systems (TIIS), 2021 - koreascience.kr
In most cases, the routing policy of networks shows a preference for a static one-to-one
mapping of communication pairs to routing paths, which offers adversaries a great …

Cybersecurity Defense via Agile Virtual Infrastructure Deception

A Slonopas, S Travis… - 2023 IEEE Virtual …, 2023 - ieeexplore.ieee.org
DDoS attacks continue to be one of the most prevalent and persistent threats to network
availability in the CIA triad. Most common defense mechanisms try to filter out the flood of …

A Survey on the Classic Active Measurement Methods for IPv6

Y Wang, T Zhou, C Hou, B Hou, Z Cai - Theoretical Computer Science …, 2021 - Springer
With the rapid development of the Internet, the IP network has become the infrastructure of
human society and plays an important role in life. However, the IPv4 network is criticized as …

[引用][C] Cyber security enhancement via software-defined pseudo-random private ip address hopping

A Slonopas, W Thompson, Z Kostic - International Journal of Computer and …, 2022