Implementation architecture of mimic security defense based on SDN

To deal with the attacks employing unknown security vulnerabilities or backdoors which are difficult for traditional defense techniques to eliminate,mimic security defense (MSD) that employs “dynamic,heterogeneity,redundancy (DHR)” mechanism can increase the difficulty and cost of attack and uncerta...

Full description

Bibliographic Details
Main Authors: Zhen-peng WANG,Hong-chao HU,Guo-zhen CHENG, Chuan-hao ZHANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-10-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2017.00205