Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (2): 15-38.doi: 10.11959/j.issn.2096-109x.2022018

• Topic: Cybersecurity——Attack and Defense Technologies • Previous Articles     Next Articles

Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology

Hailong MA1, Liang WANG1,2, Tao HU1, Yiming JIANG1, Yanze QU1   

  1. 1 Information Technology Research Institute, Information Engineering University, Zhengzhou 450003, China
    2 Unit 66135, Beijing 100043, China
  • Revised:2022-03-01 Online:2022-04-15 Published:2022-04-01
  • Supported by:
    The National Key R&D Program of China(2020YFB1804803)

Abstract:

Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.

Key words: cyberspace mimic defense, system architecture, heterogeneous strategy, scheduling strategy, non-cooperative multi-mode decision-making, heterogeneous gain

CLC Number: 

No Suggested Reading articles found!