Modeling of the mimic defense based on heterogeneous redundancy
The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack...
Saved in:
Main Authors: | Junning QIN, Jiajia HAN, Sheng ZHOU, Chunming WU, Shuangxi CHEN, Ruoyan ZHAO, Jiangyu ZHANG |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2020-05-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2020143/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01) -
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
by: Ting WU, et al.
Published: (2021-03-01) -
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
Defense of hidden backdoor technology for Web
by: Liyue CHEN, et al.
Published: (2020-05-01) -
Implementation architecture of mimic security defense based on SDN
by: Zhen-peng WANG, et al.
Published: (2017-10-01)