A Framework for Mimic Defense System in Cyberspace

被引:10
|
作者
Li, Guangsong [1 ]
Wang, Wei [1 ]
Gai, Keke [2 ]
Tang, Yazhe [3 ]
Yang, Benchao [1 ]
Si, Xueming [1 ]
机构
[1] Informat Engn Univ, State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[2] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[3] Xi An Jiao Tong Univ, Sch Comp Sci & Technol, Xian 710049, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Cyberspace security; Information system; Mimic defense system; Mimic transformation;
D O I
10.1007/s11265-019-01473-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The long-term existence of various vulnerabilities and backdoors in software and hardware makes security threats of the cyberspace more and more serious. Cyberspace mimic defense tries to use uncertain defense to deal with uncertain threat and construct the risk-controlled information system based on components with security flaws. However, mimic defense system is at a preliminary stage of research. It is necessary to pay more attention to the new theory. This paper further expands the ideas from mimic defense system and proposes a typical framework for the system. Then principles of mimic transformation design are explained. This paper also describes concepts of mimic operator and mimic awareness function. Effectiveness of mimic defense system is showed by simulations of mimic defense web server.
引用
收藏
页码:169 / 185
页数:17
相关论文
共 50 条
  • [1] A Framework for Mimic Defense System in Cyberspace
    Guangsong Li
    Wei Wang
    Keke Gai
    Yazhe Tang
    Benchao Yang
    Xueming Si
    [J]. Journal of Signal Processing Systems, 2021, 93 : 169 - 185
  • [2] A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture
    Liu, Wenyan
    Chen, Fucai
    Hu, Hongchao
    Cheng, Guozhen
    Huo, Shumin
    Liang, Hao
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 50 - 53
  • [3] Optimal Strategy for Cyberspace Mimic Defense Based on Game Theory
    Chen, Zequan
    Cui, Gang
    Zhang, Lin
    Yang, Xin
    Li, Hui
    Zhao, Yan
    Ma, Chengtao
    Sun, Tao
    [J]. IEEE ACCESS, 2021, 9 : 68376 - 68386
  • [4] Mimic defense: a designed-in cybersecurity defense framework
    Hu, Hongchao
    Wu, Jiangxing
    Wang, Zhenpeng
    Cheng, Guozhen
    [J]. IET INFORMATION SECURITY, 2018, 12 (03) : 226 - 237
  • [5] An Adaptive Multiexecutors Scheduling Algorithm Based on Heterogeneity for Cyberspace Mimic Defense
    Zhu, Zhengbin
    Yu, Hong
    Liu, Qinrang
    Liu, Dongpei
    Yu, Huapeng
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] An Optimal Seed Scheduling Strategy Algorithm Applied to Cyberspace Mimic Defense
    Chen, Zhuoxing
    Lu, Yiqin
    Qin, Jiancheng
    Cheng, Zhe
    [J]. IEEE ACCESS, 2021, 9 (09): : 129032 - 129050
  • [7] Scheduling Sequence Control Method Based on Sliding Window in Cyberspace Mimic Defense
    Guo, Wei
    Wu, Zhaoqi
    Zhang, Fan
    Wu, Jiangxing
    [J]. IEEE ACCESS, 2020, 8 : 1517 - 1533
  • [8] Effectiveness Evaluation on Cyberspace Security Defense System
    Lan, Yun
    Liu, Sheng-peng
    Lin, Li
    Ma, Yuan-yuan
    [J]. 2015 International Conference on Network and Information Systems for Computers (ICNISC), 2015, : 576 - 579
  • [9] Microservice Security Framework for IoT by Mimic Defense Mechanism
    Ying, Fei
    Zhao, Shengjie
    Deng, Hao
    [J]. SENSORS, 2022, 22 (06)
  • [10] Security Research of Redundancy in Mimic Defense System
    Ma, Bolin
    Zhang, Zheng
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 2910 - 2914