{"title":"基于四执行者的模拟防御与防御能力分析","authors":"Ling Ouyang, Ke Song, Xiangyang Lu, Xiaoquan Li","doi":"10.1109/ICAMECHS.2018.8506861","DOIUrl":null,"url":null,"abstract":"In recent years, with rapid development of information technology, the network attacks against known or unknown bugs and backdoors are endless and difficult to be solved effectively, so the academician Wu Jiangxing has developed an innovative defense technology that can “change the rules of the game” - mimic defense technology and validated in the fields of web server, etc. But in practice, for the mimic defense technology, the mode of triple redundancy is usually adopted for mimic structural design, in this paper, two types of attack probability model and scheduling arbitration algorithms and triple redundancy structure and quadruple redundancy structure are analyzed, and it is theoretically proven that the triple redundancy structure has limited defense capability in responding to evasive triggered attacks, the quadruple redundancy structure has better defense effect, and the structure have a good reference value for the mimic architectural design.","PeriodicalId":325361,"journal":{"name":"2018 International Conference on Advanced Mechatronic Systems (ICAMechS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Analysis of Mimic Defense and Defense Capabilities based on Four-Executor\",\"authors\":\"Ling Ouyang, Ke Song, Xiangyang Lu, Xiaoquan Li\",\"doi\":\"10.1109/ICAMECHS.2018.8506861\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, with rapid development of information technology, the network attacks against known or unknown bugs and backdoors are endless and difficult to be solved effectively, so the academician Wu Jiangxing has developed an innovative defense technology that can “change the rules of the game” - mimic defense technology and validated in the fields of web server, etc. But in practice, for the mimic defense technology, the mode of triple redundancy is usually adopted for mimic structural design, in this paper, two types of attack probability model and scheduling arbitration algorithms and triple redundancy structure and quadruple redundancy structure are analyzed, and it is theoretically proven that the triple redundancy structure has limited defense capability in responding to evasive triggered attacks, the quadruple redundancy structure has better defense effect, and the structure have a good reference value for the mimic architectural design.\",\"PeriodicalId\":325361,\"journal\":{\"name\":\"2018 International Conference on Advanced Mechatronic Systems (ICAMechS)\",\"volume\":\"65 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Advanced Mechatronic Systems (ICAMechS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICAMECHS.2018.8506861\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Advanced Mechatronic Systems (ICAMechS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAMECHS.2018.8506861","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Mimic Defense and Defense Capabilities based on Four-Executor
In recent years, with rapid development of information technology, the network attacks against known or unknown bugs and backdoors are endless and difficult to be solved effectively, so the academician Wu Jiangxing has developed an innovative defense technology that can “change the rules of the game” - mimic defense technology and validated in the fields of web server, etc. But in practice, for the mimic defense technology, the mode of triple redundancy is usually adopted for mimic structural design, in this paper, two types of attack probability model and scheduling arbitration algorithms and triple redundancy structure and quadruple redundancy structure are analyzed, and it is theoretically proven that the triple redundancy structure has limited defense capability in responding to evasive triggered attacks, the quadruple redundancy structure has better defense effect, and the structure have a good reference value for the mimic architectural design.