Telecommunications Science ›› 2020, Vol. 36 ›› Issue (5): 31-38.doi: 10.11959/j.issn.1000-0801.2020143

• Topic: Intelligent and Highly Confrontational Development of Network Security • Previous Articles     Next Articles

Modeling of the mimic defense based on heterogeneous redundancy

Junning QIN1,Jiajia HAN2,Sheng ZHOU3,Chunming WU4,Shuangxi CHEN4,5(),Ruoyan ZHAO4,Jiangyu ZHANG4   

  1. 1 Zhejiang Huayun Info Technology Co.,Ltd.,Hangzhou 310027,China
    2 State Grid Zhejiang Electric Power Co.,Ltd.Research Institute,Hangzhou 310027,China
    3 State Grid Zhejiang Electric Power Co.,Ltd.,Hangzhou 310027,China
    4 Zhejiang University,Hangzhou 310058,China
    5 Jiaxing Vocational and Technical College,Jiaxing 314036,China
  • Revised:2020-04-25 Online:2020-05-20 Published:2020-05-18
  • Supported by:
    The Science and Technology Funding Project of State Grid(52110118001F)

Abstract:

The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.

Key words: traditional defense, unbalanced situation, penetration test, heterogeneous redundancy, mimic defense

CLC Number: 

No Suggested Reading articles found!