Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were re...
Main Authors: | Hailong MA, Tao HU, Yiming JIANG, Yanze QU, Liang WANG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2022-04-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.infocomm-journal.com/cjnis/CN/10.11959/j.issn.2096-109x.2022018 |
Similar Items
-
An Optimal Seed Scheduling Strategy Algorithm Applied to Cyberspace Mimic Defense
by: Zhuoxing Chen, et al.
Published: (2021-01-01) -
Scheduling Sequence Control Method Based on Sliding Window in Cyberspace Mimic Defense
by: Wei Guo, et al.
Published: (2020-01-01) -
Optimal Strategy for Cyberspace Mimic Defense Based on Game Theory
by: Zequan Chen, et al.
Published: (2021-01-01) -
A Novel Model of Mimic Defense Based on Minimal L-Order Error Probability
by: Guoxi Chen, et al.
Published: (2020-01-01) -
Implementation architecture of mimic security defense based on SDN
by: Zhen-peng WANG,Hong-chao HU,Guo-zhen CHENG, et al.
Published: (2017-10-01)