Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology

Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were re...

Full description

Saved in:
Bibliographic Details
Main Authors: Hailong MA, Liang WANG, Tao HU, Yiming JIANG, Yanze QU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-04-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022018
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529818147979264
author Hailong MA
Liang WANG
Tao HU
Yiming JIANG
Yanze QU
author_facet Hailong MA
Liang WANG
Tao HU
Yiming JIANG
Yanze QU
author_sort Hailong MA
collection DOAJ
description Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.
format Article
id doaj-art-b542a23ee0a348a2aeb631cd9c0d7a93
institution Kabale University
issn 2096-109X
language English
publishDate 2022-04-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-b542a23ee0a348a2aeb631cd9c0d7a932025-01-15T03:15:27ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-04-018153859570314Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecologyHailong MALiang WANGTao HUYiming JIANGYanze QUBuild upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022018cyberspace mimic defensesystem architectureheterogeneous strategyscheduling strategynon-cooperative multi-mode decision-makingheterogeneous gain
spellingShingle Hailong MA
Liang WANG
Tao HU
Yiming JIANG
Yanze QU
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
网络与信息安全学报
cyberspace mimic defense
system architecture
heterogeneous strategy
scheduling strategy
non-cooperative multi-mode decision-making
heterogeneous gain
title Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
title_full Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
title_fullStr Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
title_full_unstemmed Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
title_short Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
title_sort survey on the development of mimic defense in cyberspace from mimic concept to mimic ecology
topic cyberspace mimic defense
system architecture
heterogeneous strategy
scheduling strategy
non-cooperative multi-mode decision-making
heterogeneous gain
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022018
work_keys_str_mv AT hailongma surveyonthedevelopmentofmimicdefenseincyberspacefrommimicconcepttomimicecology
AT liangwang surveyonthedevelopmentofmimicdefenseincyberspacefrommimicconcepttomimicecology
AT taohu surveyonthedevelopmentofmimicdefenseincyberspacefrommimicconcepttomimicecology
AT yimingjiang surveyonthedevelopmentofmimicdefenseincyberspacefrommimicconcepttomimicecology
AT yanzequ surveyonthedevelopmentofmimicdefenseincyberspacefrommimicconcepttomimicecology