Modeling of the mimic defense based on heterogeneous redundancy
The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack...
Saved in:
Main Authors: | , , , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2020-05-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020143/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530685795336192 |
---|---|
author | Junning QIN Jiajia HAN Sheng ZHOU Chunming WU Shuangxi CHEN Ruoyan ZHAO Jiangyu ZHANG |
author_facet | Junning QIN Jiajia HAN Sheng ZHOU Chunming WU Shuangxi CHEN Ruoyan ZHAO Jiangyu ZHANG |
author_sort | Junning QIN |
collection | DOAJ |
description | The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected. |
format | Article |
id | doaj-art-9619a61d42d44642bcea13fece22df09 |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2020-05-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-9619a61d42d44642bcea13fece22df092025-01-15T03:00:41ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-05-0136313859583032Modeling of the mimic defense based on heterogeneous redundancyJunning QINJiajia HANSheng ZHOUChunming WUShuangxi CHENRuoyan ZHAOJiangyu ZHANGThe unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020143/traditional defenseunbalanced situationpenetration testheterogeneous redundancymimic defense |
spellingShingle | Junning QIN Jiajia HAN Sheng ZHOU Chunming WU Shuangxi CHEN Ruoyan ZHAO Jiangyu ZHANG Modeling of the mimic defense based on heterogeneous redundancy Dianxin kexue traditional defense unbalanced situation penetration test heterogeneous redundancy mimic defense |
title | Modeling of the mimic defense based on heterogeneous redundancy |
title_full | Modeling of the mimic defense based on heterogeneous redundancy |
title_fullStr | Modeling of the mimic defense based on heterogeneous redundancy |
title_full_unstemmed | Modeling of the mimic defense based on heterogeneous redundancy |
title_short | Modeling of the mimic defense based on heterogeneous redundancy |
title_sort | modeling of the mimic defense based on heterogeneous redundancy |
topic | traditional defense unbalanced situation penetration test heterogeneous redundancy mimic defense |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020143/ |
work_keys_str_mv | AT junningqin modelingofthemimicdefensebasedonheterogeneousredundancy AT jiajiahan modelingofthemimicdefensebasedonheterogeneousredundancy AT shengzhou modelingofthemimicdefensebasedonheterogeneousredundancy AT chunmingwu modelingofthemimicdefensebasedonheterogeneousredundancy AT shuangxichen modelingofthemimicdefensebasedonheterogeneousredundancy AT ruoyanzhao modelingofthemimicdefensebasedonheterogeneousredundancy AT jiangyuzhang modelingofthemimicdefensebasedonheterogeneousredundancy |