A Review of the Basic Theory of Mimic Defense

Xueming Si, Wei Wang, Junjie Zeng, Benchao Yang, Guangsong Li, Chao Yuan, Fan Zhang

Strategic Study of CAE ›› 2016, Vol. 18 ›› Issue (6) : 62-68.

PDF(380 KB)
PDF(380 KB)
Strategic Study of CAE ›› 2016, Vol. 18 ›› Issue (6) : 62-68. DOI: 10.15302/J-SSCAE-2016.06.013
Study on Special Subjects
Original article

A Review of the Basic Theory of Mimic Defense

Author information +
History +

Abstract

With the development of the Internet, cyberspace security issues have become a major concern related to national security. This paper first introduces some classic network defense technology. Next, it introduces the technology of mimic defense, including mimic defense systems, related scientific problems, and the theoretical framework of mimicry defense. The effectiveness of a mimic defense system is also analyzed in comparison with a traditional network defense technology. Finally, some problems worthy of study are presented regarding the basic theory of mimic defense.

Keywords

mimic defense / cyberspace / moving target defense / mimicry transformation

Cite this article

Download citation ▾
Xueming Si, Wei Wang, Junjie Zeng, Benchao Yang, Guangsong Li, Chao Yuan, Fan Zhang. A Review of the Basic Theory of Mimic Defense. Strategic Study of CAE, 2016, 18(6): 62‒68 https://doi.org/10.15302/J-SSCAE-2016.06.013

References

[1]
$$$Kenkre P S, Pai A, Colaco L. Real time intrusion detection and pre-vention system[C] //Satapathy S C, Biswal B N, Udgata S K, et al. Proceedings of the 3rd international conference on frontiers of intelli-gent computing: Theory and applications (FICTA)2014.
[2]
Wu J X. Mimic security defense in cyber space [J]. Secrecy Science and Technology, 2014, 10(1): 4–9.
[3]
Powell D, Stroud R. Project IST-1999-11583 malicious- and acciden-tal-fault tolerance for internet applications: Conceptual model and ar-chitecture of MAFTIA [R]. Newcastle: University of Newcastle upon Tyne, 2003.
[4]
Jajodia S, Ghosh A K, Swarup V, et al. Moving target defense: Creat-ing asymmetric uncertainty for cyber threats [M]. New York: Springer, 2011.
[5]
Gupta V, Lam V, Ramasamy HG V, et al. Dependability and perfor-mance evaluation of intrusion-tolerant server architectures [M]. Berlin: Springer, 2003.
[6]
Wang F, Jou F, Gong F, et al. SITAR: A scalable intrusion-tolerant architecture for distributed services [C]// Proceedings of the 2001 IEEE— Workshop on information assurance and security. New York: United States Military Academy, 2003.
[7]
Malkhi D, Reiter M. Byzantine quorum systems [J]. Distributed Com-puting, 1998, 11(4): 203–213.
[8]
Kewley D L, Bouchard J F. DARPA information assurance program dynamic defense experiment summary [J]. IEEE Transactions on Systems, Man, and Cybernetics. Part A, Systems and Humans, 2001, 31(4): 331–336.
[9]
Okhravi H, Hobson T, Bigelow D, et al. Finding focus in the blur of moving-target techniques [J]. IEEE Security & Privacy, 2014, 12(2): 16–26.
AI Summary AI Mindmap
PDF(380 KB)

Accesses

Citations

Detail

Sections
Recommended

/