Modeling of the mimic defense based on heterogeneous redundancy

The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack...

Full description

Saved in:
Bibliographic Details
Main Authors: Junning QIN, Jiajia HAN, Sheng ZHOU, Chunming WU, Shuangxi CHEN, Ruoyan ZHAO, Jiangyu ZHANG
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2020-05-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020143/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530685795336192
author Junning QIN
Jiajia HAN
Sheng ZHOU
Chunming WU
Shuangxi CHEN
Ruoyan ZHAO
Jiangyu ZHANG
author_facet Junning QIN
Jiajia HAN
Sheng ZHOU
Chunming WU
Shuangxi CHEN
Ruoyan ZHAO
Jiangyu ZHANG
author_sort Junning QIN
collection DOAJ
description The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.
format Article
id doaj-art-9619a61d42d44642bcea13fece22df09
institution Kabale University
issn 1000-0801
language zho
publishDate 2020-05-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-9619a61d42d44642bcea13fece22df092025-01-15T03:00:41ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012020-05-0136313859583032Modeling of the mimic defense based on heterogeneous redundancyJunning QINJiajia HANSheng ZHOUChunming WUShuangxi CHENRuoyan ZHAOJiangyu ZHANGThe unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020143/traditional defenseunbalanced situationpenetration testheterogeneous redundancymimic defense
spellingShingle Junning QIN
Jiajia HAN
Sheng ZHOU
Chunming WU
Shuangxi CHEN
Ruoyan ZHAO
Jiangyu ZHANG
Modeling of the mimic defense based on heterogeneous redundancy
Dianxin kexue
traditional defense
unbalanced situation
penetration test
heterogeneous redundancy
mimic defense
title Modeling of the mimic defense based on heterogeneous redundancy
title_full Modeling of the mimic defense based on heterogeneous redundancy
title_fullStr Modeling of the mimic defense based on heterogeneous redundancy
title_full_unstemmed Modeling of the mimic defense based on heterogeneous redundancy
title_short Modeling of the mimic defense based on heterogeneous redundancy
title_sort modeling of the mimic defense based on heterogeneous redundancy
topic traditional defense
unbalanced situation
penetration test
heterogeneous redundancy
mimic defense
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020143/
work_keys_str_mv AT junningqin modelingofthemimicdefensebasedonheterogeneousredundancy
AT jiajiahan modelingofthemimicdefensebasedonheterogeneousredundancy
AT shengzhou modelingofthemimicdefensebasedonheterogeneousredundancy
AT chunmingwu modelingofthemimicdefensebasedonheterogeneousredundancy
AT shuangxichen modelingofthemimicdefensebasedonheterogeneousredundancy
AT ruoyanzhao modelingofthemimicdefensebasedonheterogeneousredundancy
AT jiangyuzhang modelingofthemimicdefensebasedonheterogeneousredundancy