Implementation architecture of mimic security defense based on SDN

To deal with the attacks employing unknown security vulnerabilities or backdoors which are difficult for traditional defense techniques to eliminate,mimic security defense (MSD) that employs “dynamic,heterogeneity,redundancy (DHR)” mechanism can increase the difficulty and cost of attack and uncerta...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhen-peng WANG, Hong-chao HU, Guo-zhen CHENG, Chuan-hao ZHANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-10-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00205
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530260442578944
author Zhen-peng WANG
Hong-chao HU
Guo-zhen CHENG
Chuan-hao ZHANG
author_facet Zhen-peng WANG
Hong-chao HU
Guo-zhen CHENG
Chuan-hao ZHANG
author_sort Zhen-peng WANG
collection DOAJ
description To deal with the attacks employing unknown security vulnerabilities or backdoors which are difficult for traditional defense techniques to eliminate,mimic security defense (MSD) that employs “dynamic,heterogeneity,redundancy (DHR)” mechanism can increase the difficulty and cost of attack and uncertainty of system so as to improve network security.Based on the software defined networking (SDN),an implementation architecture of MSD was proposed.First,diverse functional equivalent variants for the protected target were constructed,then leverage the rich programmability and flexibility of SDN to realize the dynamic scheduling and decision-making functions on SDN controller.Simulation and experimental results prove the availability and the intrusion tolerant ability of the architecture.
format Article
id doaj-art-fb2a737634e24066b5c15c03d13dc0f5
institution Kabale University
issn 2096-109X
language English
publishDate 2017-10-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-fb2a737634e24066b5c15c03d13dc0f52025-01-15T03:06:08ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-10-013526159551711Implementation architecture of mimic security defense based on SDNZhen-peng WANGHong-chao HUGuo-zhen CHENGChuan-hao ZHANGTo deal with the attacks employing unknown security vulnerabilities or backdoors which are difficult for traditional defense techniques to eliminate,mimic security defense (MSD) that employs “dynamic,heterogeneity,redundancy (DHR)” mechanism can increase the difficulty and cost of attack and uncertainty of system so as to improve network security.Based on the software defined networking (SDN),an implementation architecture of MSD was proposed.First,diverse functional equivalent variants for the protected target were constructed,then leverage the rich programmability and flexibility of SDN to realize the dynamic scheduling and decision-making functions on SDN controller.Simulation and experimental results prove the availability and the intrusion tolerant ability of the architecture.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00205mimic security defensesoftware defined networkingactive defensedynamic heterogeneous redundancy
spellingShingle Zhen-peng WANG
Hong-chao HU
Guo-zhen CHENG
Chuan-hao ZHANG
Implementation architecture of mimic security defense based on SDN
网络与信息安全学报
mimic security defense
software defined networking
active defense
dynamic heterogeneous redundancy
title Implementation architecture of mimic security defense based on SDN
title_full Implementation architecture of mimic security defense based on SDN
title_fullStr Implementation architecture of mimic security defense based on SDN
title_full_unstemmed Implementation architecture of mimic security defense based on SDN
title_short Implementation architecture of mimic security defense based on SDN
title_sort implementation architecture of mimic security defense based on sdn
topic mimic security defense
software defined networking
active defense
dynamic heterogeneous redundancy
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00205
work_keys_str_mv AT zhenpengwang implementationarchitectureofmimicsecuritydefensebasedonsdn
AT hongchaohu implementationarchitectureofmimicsecuritydefensebasedonsdn
AT guozhencheng implementationarchitectureofmimicsecuritydefensebasedonsdn
AT chuanhaozhang implementationarchitectureofmimicsecuritydefensebasedonsdn