Network function heterogeneous redundancy deployment method based on immune algorithm
Aiming at the problem that the existing security defense methods cannot resist many unknown vulnerabilities and backdoors in the network function virtualization platform, a mimic defense architecture for network function virtualization using mimic defense ideas was proposed, a heterogeneous redundan...
Saved in:
Main Authors: | Qingqing ZHANG, Hongbo TANG, Wei YOU, Yingle LI |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021005 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01) -
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01) -
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
by: Ting WU, et al.
Published: (2021-03-01) -
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
Executive dynamic scheduling algorithm based on high-order heterogeneity
by: Hongyong JIA, et al.
Published: (2022-03-01)