Implementation architecture of mimic security defense based on SDN
To deal with the attacks employing unknown security vulnerabilities or backdoors which are difficult for traditional defense techniques to eliminate,mimic security defense (MSD) that employs “dynamic,heterogeneity,redundancy (DHR)” mechanism can increase the difficulty and cost of attack and uncerta...
Saved in:
Main Authors: | Zhen-peng WANG, Hong-chao HU, Guo-zhen CHENG, Chuan-hao ZHANG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-10-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00205 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Endogenous security architecture of Ethernet switch based on mimic defense
by: Ke SONE, et al.
Published: (2020-05-01) -
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01) -
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01) -
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
Mimic defense authentication method for physical access control
by: Qinglei ZHOU, et al.
Published: (2020-06-01)