Back to Search Start Over

Modeling of the mimic defense based on heterogeneous redundancy

Authors :
Junning QIN
Jiajia HAN
Sheng ZHOU
Chunming WU
Shuangxi CHEN
Ruoyan ZHAO
Jiangyu ZHANG
Source :
Dianxin kexue, Vol 36, Pp 31-38 (2020)
Publication Year :
2020
Publisher :
Beijing Xintong Media Co., Ltd, 2020.

Abstract

The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.

Details

Language :
Chinese
ISSN :
10000801
Volume :
36
Database :
Directory of Open Access Journals
Journal :
Dianxin kexue
Publication Type :
Academic Journal
Accession number :
edsdoj.9619a61d42d44642bcea13fece22df09
Document Type :
article
Full Text :
https://doi.org/10.11959/j.issn.1000-0801.2020143