Journal on Communications ›› 2022, Vol. 43 ›› Issue (6): 71-84.doi: 10.11959/j.issn.1000-436x.2022081
• Papers • Previous Articles Next Articles
Dacheng ZHOU, Hongchang CHEN, Guozhen CHENG, Weizhen HE, Ke SHANG, Hongchao HU
Revised:
2022-03-24
Online:
2022-06-01
Published:
2022-06-01
Supported by:
CLC Number:
Dacheng ZHOU, Hongchang CHEN, Guozhen CHENG, Weizhen HE, Ke SHANG, Hongchao HU. Design and implementation of adaptive mimic voting device oriented to persistent connection[J]. Journal on Communications, 2022, 43(6): 71-84.
[1] | 邬江兴 . 网络空间拟态防御研究[J]. 信息安全学报, 2016,1(4): 1-10. |
WU J X . Research on cyber mimic defense[J]. Journal of Cyber Security, 2016,1(4): 1-10. | |
[2] | 吴铤, 胡程楠, 陈庆南 ,等. 基于执行体划分的防御增强型动态异构冗余架构[J]. 通信学报, 2021,42(3): 122-134. |
WU T , HU C N , CHEN Q N ,et al. Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition[J]. Journal on Communications, 2021,42(3): 122-134. | |
[3] | MCALLISTER D F , SUN C , VOUK M A . Reliability of voting in fault-tolerant software systems for small output-spaces[J]. IEEE Transactions on Reliability, 1990,39(5): 524-534. |
[4] | JAMALI N , SAMMUT C . Majority voting:material classification by tactile sensing using surface texture[J]. IEEE Transactions on Robotics, 2011,27(3): 508-521. |
[5] | 仝青, 张铮, 张为华 ,等. 拟态防御 Web 服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897. |
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017,28(4): 883-897. | |
[6] | 张文建, 宋克, 谭力波 ,等. 面向拟态判决的可编程语义解析方法[J]. 通信学报, 2020,41(4): 62-69. |
ZHANG W J , SONG K , TAN L B ,et al. Programmable semantic parsing approach for mimic arbitration[J]. Journal on Communications, 2020,41(4): 62-69. | |
[7] | 马博林, 张铮, 刘健雄 . 应用于动态异构Web服务器的相似度求解方法[J]. 计算机工程与设计, 2018,39(1): 282-287. |
MA B L , ZHANG Z , LIU J X . Similarity calculation method applied to dynamic heterogeneous Web server system[J]. Computer Engineering and Design, 2018,39(1): 282-287. | |
[8] | QI C , WU J X , HU H C ,et al. An intensive security architecture with multi-controller for SDN[C]// Proceedings of 2016 IEEE Conference on Computer Communications Workshops. Piscataway:IEEE Press, 2016: 401-402. |
[9] | 欧阳城添, 王曦, 郑剑 . 自适应一致表决算法[J]. 计算机科学, 2011,38(7): 130-133. |
OUYANG C T , WANG X , ZHENG J . Adaptive consensus voting algorithm[J]. Computer Science, 2011,38(7): 130-133. | |
[10] | HU H C , WU J X , WANG Z P ,et al. Mimic defense:a designed-in cybersecurity defense framework[J]. IET Information Security, 2018,12(3): 226-237. |
[11] | 陆以勤, 黄俊贤, 程喆 ,等. 基于改进AHP-FCE模型的多指标拟态表决算法[J]. 北京邮电大学学报, 2021,44(2): 8-13. |
LU Y Q , HUANG J X , CHENG Z ,et al. A multi-index mimic voting algorithm based on improved AHP-FCE model[J]. Journal of Beijing University of Posts and Telecommunications, 2021,44(2): 8-13. | |
[12] | ZHOU D C , CHEN H C , CHENG G Z ,et al. SecIngress:an API gateway framework to secure cloud applications based on N-variant system[J]. China Communications, 2021,18(8): 17-34. |
[13] | 林森杰, 刘勤让, 王孝龙 . 面向拟态防御系统的竞赛式仲裁模型[J]. 计算机工程, 2018,44(4): 193-198. |
LIN S J , LIU Q R , WANG X L . Competitive arbitration model for mimic defense system[J]. Computer Engineering, 2018,44(4): 193-198. | |
[14] | WANG Y W , WU J X , GUO Y F ,et al. Scientific workflow execution system based on mimic defense in the cloud environment[J]. Frontiers of Information Technology & Electronic Engineering, 2018,19(12): 1522-1536. |
[15] | TH?NES J . Microservices[J]. IEEE Software, 2015,32(1): 116. |
[16] | AKHSHABI S , NARAYANASWAMY S , BEGEN A C ,et al. An experimental evaluation of rate-adaptive video players over HTTP[J]. Signal Processing:Image Communication, 2012,27(4): 271-287. |
[17] | 王禛鹏, 扈红超, 程国振 . 一种基于拟态安全防御的 DNS 框架设计[J]. 电子学报, 2017,45(11): 2705-2714. |
WANG Z P , HU H C , CHENG G Z . A DNS architecture based on mimic security defense[J]. Acta Electronica Sinica, 2017,45(11): 2705-2714. | |
[18] | 张铮, 马博林, 邬江兴 . Web 服务器拟态防御原理验证系统测试与分析[J]. 信息安全学报, 2017,2(1): 13-28. |
ZHANG Z , MA B L , WU J X . The test and analysis of prototype of mimic defense in Web servers[J]. Journal of Cyber Security, 2017,2(1): 13-28. | |
[19] | SCARF H E . Inventory theory[J]. Operations Research, 2002,50(1): 186-191. |
[20] | 杨益民, 付必胜 . 仓库容量有限条件下的生产销售存贮模型[J]. 系统工程, 2001,19(1): 18-23. |
YANG Y M , FU B S . The storage model about production and sale under the condition of limited-space storehouse[J]. Systems Engineering, 2001,19(1): 18-23. |
[1] | Jin ZHANG, Qiang GE, Weihai XU, Yiming JIANG, Hailong MA, Hongtao YU. Design, implementation and formal verification of BGP proxy for mimic router [J]. Journal on Communications, 2023, 44(3): 33-44. |
[2] | Hongyong JIA, Yunfei PAN, Wenhe LIU, Junjie ZENG, Jianhui ZHANG. Executive dynamic scheduling algorithm based on high-order heterogeneity [J]. Journal on Communications, 2022, 43(3): 233-245. |
[3] | Zhengbin ZHU, Qinrang LIU, Dongpei LIU, Chong WANG. Research progress of mimic multi-execution scheduling algorithm [J]. Journal on Communications, 2021, 42(5): 179-190. |
[4] | Ting WU, Chengnan HU, Qingnan CHEN, Anbang CHEN, Qiuhua ZHENG. Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition [J]. Journal on Communications, 2021, 42(3): 122-134. |
[5] | Chuanxing PAN, Zheng ZHANG, Bolin MA, Yuan YAO, Xinsheng JI. Method against process control-flow hijacking based on mimic defense [J]. Journal on Communications, 2021, 42(1): 37-47. |
[6] | Shaohu DING,Ning QI,Yiwei GUO. Evaluation of mimic defense strategy based on M-FlipIt game model [J]. Journal on Communications, 2020, 41(7): 186-194. |
[7] | Qinglei ZHOU,Shaohuan BAN,Yingjie HAN,Feng FENG. Mimic defense authentication method for physical access control [J]. Journal on Communications, 2020, 41(6): 80-87. |
[8] | Ke SONE,Qinrang LIU,Shuai WEI,Wenjian ZHANG,Libo TAN. Endogenous security architecture of Ethernet switch based on mimic defense [J]. Journal on Communications, 2020, 41(5): 18-26. |
[9] | Yuan YAO,Chuanxing PAN,Zheng ZHANG,Gaofei ZHANG. Method of quantitative assessment for diversified software system [J]. Journal on Communications, 2020, 41(3): 120-125. |
[10] | Xingming ZHANG,Zeyu GU,Shuai WEI,Jianliang SHEN. Markov game modeling of mimic defense and defense strategy determination [J]. Journal on Communications, 2018, 39(10): 143-154. |
[11] | Li-rong XIONG,Jing-zhi LEI,Xin JIN. Research on Q-learning based rate control approach for HTTP adaptive streaming [J]. Journal on Communications, 2017, 38(9): 18-24. |
[12] | Chun-jing HAN,Ye YANG,Hong-lei LYU,Jing-guo GE,Tong LI,Yun-jie LIU. Research on the backbone network cache method based on application-awareness [J]. Journal on Communications, 2017, 38(12): 73-85. |
[13] | Wu-bin PAN,Guang CHENG,Xiao-jun GUO,Shun-xiang HUANG. Review and perspective on encrypted traffic identification research [J]. Journal on Communications, 2016, 37(9): 154-167. |
[14] | Hai-lun LIN,Yan LI,Wei-ping WANG,Yin-liang YUE,Zheng LIN. Cookie based online tracing method for cyberlockers resource [J]. Journal on Communications, 2016, 37(12): 77-85. |
[15] | . Portal authentication HTTP redirection using netfilter NFQUEUE [J]. Journal on Communications, 2014, 35(Z1): 20-106. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|