Journal Home Online First Current Issue Archive For Authors Journal Information 中文版

Strategic Study of CAE >> 2016, Volume 18, Issue 6 doi: 10.15302/J-SSCAE-2016.06.013

A Review of the Basic Theory of Mimic Defense

1. State Key Laboratory of Mathematical Engineering and Advanced Computing, The PLA Information Engineering University, Zhengzhou 450001, China;

2. National Digital Switching System Engineering & Technological R&D Center, The PLA Information Engineering University, Zhengzhou 450002, China

Funding project:中国工程院重大咨询项目“网络空间安全战略研究”(2015-ZD-10);国家重点研发计划 (2016YFB0800101, 2016YFB0800100); 数学与先进计算国家重点实验室开放课题 (2015A14);国家自然科学基金创新研究群体项目 (61521003);国家自然科学基金项目 (61572520,61602512) Received: 2016-10-21 Revised: 2016-11-01 Available online: 2016-12-13 15:28:28.000

Next Previous

Abstract

With the development of the Internet, cyberspace security issues have become a major concern related to national security. This paper first introduces some classic network defense technology. Next, it introduces the technology of mimic defense, including mimic defense systems, related scientific problems, and the theoretical framework of mimicry defense. The effectiveness of a mimic defense system is also analyzed in comparison with a traditional network defense technology. Finally, some problems worthy of study are presented regarding the basic theory of mimic defense.

Figures

Fig. 1.

References

[ 1 ] Zhang H G, Han W B, Lai X J, et al. Survey on cyberspace secu-rity [J]. Scientia Sinica Informationis, 2016, 46 (2):125–164. link1

[ 2 ] Jajodia S, Ghosh A K, Swarup V, et al, editors. Moving target defense—Creating asymmetric uncertainty for cyber threats [M]. New York: Springer Publishing Company, 2011. link1

[ 3 ] Evans D, Nguyen-Tuong A, Knight J. Effectiveness of moving target defenses [M]// Jajodia S, Ghosh A K, Swarup V, et al, edi-tors. Moving Target Defense—Creating asymmetric uncertainty for cyber threats. New York: Springer Publishing Company, 2011: 29–48. link1

[ 4 ] Han Y J, Lu W L, Xu S H. Characterizing the power of moving target defense via cyber epidemic dynamics [C]// HotSoS’14 pro-ceedings of the 2014 symposium and bootcamp on the science of security. New York: Association for Computing Machinery (ACM), 2014: 1–12. link1

[ 5 ] Zhang X Y,Li Z B. Overview on moving target defense tech-nology [J].Communications Technology, 2013, 46 (6): 111–113. Chinese. link1

[ 6 ] Zhuang R, DeLoach S A, Ou X M . Towards a theory of moving target defense[C]// MTD’14 proceedings of the first ACM work-shop on moving target defense. New York: ACM, 2014: 31–40. link1

[ 7 ] Shi L Y, Jia C F, Lv S W. Research on end hopping for active net-work confrontation[J]. Journal on Communications, 2008, 29 (2): 106–110. Chinese. link1

[ 8 ] Li Z T, Xu X D. The analysis of dynamic honeypot and its design [J]. Journal of Huazhong University of Science and Technology (Nature Science Edition). 2005, 33 (2): 86–88. Chinese. link1

[ 9 ] Shi L Y, Jiang L L, Liu X, et al. Game theoretic analysis for the feature of mimicry honeypot [J]. Journal of Electronics & Infor-mation Technology, 2013, 35 (5): 1063–1068. Chinese.

[10] Zang H W, Han W, Gao D Y. Dissimilar redundancy computer system and reliability analysis [J]. Journal of Harbin Institute of Technology, 2003, 33 (3): 492–494. Chinese. link1

[11] Wu J X. Meaning and vision of mimic computing and mimic secu-rity defense [J]. Telecommunications Science, 2014, 30 (7): 2–7. Chinese. link1

[12] Wu J X. Mimic security defense in cyber space [J].Secrecy Sci-ence and Technology, 2014 (10): 4–9. Chinese. link1

Related Research