Network function heterogeneous redundancy deployment method based on immune algorithm

Aiming at the problem that the existing security defense methods cannot resist many unknown vulnerabilities and backdoors in the network function virtualization platform, a mimic defense architecture for network function virtualization using mimic defense ideas was proposed, a heterogeneous redundan...

Full description

Saved in:
Bibliographic Details
Main Authors: Qingqing ZHANG, Hongbo TANG, Wei YOU, Yingle LI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021005
Tags: Add Tag
No Tags, Be the first to tag this record!