2020
DOI: 10.1049/cje.2020.02.017
|View full text |Cite
|
Sign up to set email alerts
|

A Generalized Information Security Model SOCMD for CMD Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…A modeling technique has been developed, focused on the use of the proposed models Strengths and limitations of results. Several studies (Ghiasi et al, 2023;Zhang et al, 2020) have studied generalized IPS models, but the main drawback of generalized models is the very poor elaboration of their formal aspects. A characteristic feature is that this problem is very complex and nontrivial and its solution requires a lot of time and resources, which significantly complicates the practical use of such models.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…A modeling technique has been developed, focused on the use of the proposed models Strengths and limitations of results. Several studies (Ghiasi et al, 2023;Zhang et al, 2020) have studied generalized IPS models, but the main drawback of generalized models is the very poor elaboration of their formal aspects. A characteristic feature is that this problem is very complex and nontrivial and its solution requires a lot of time and resources, which significantly complicates the practical use of such models.…”
Section: Discussionmentioning
confidence: 99%
“…Many studies by Ghiasi et al (2023); Zhang et al (2020) have investigated generalized IPS models. Their main feature is the simultaneous consideration of numerous factors that determine the functioning of the protection system.…”
Section: Analytical Review Of Current Ips Modelsmentioning
confidence: 99%
“…In recent years, Cyber mimic defense (CMD) has emerged as a promising active network defense technology in the cyber‐security landscape [ 10 ] . Compare to MTD, CMD is more targeted and presents a more unpredictable defensive behavior in cyberspace [ 11 ] . Leveraging the advances in cloud computing to reduce CapEx and OpEx, CMD is suitable for building a high‐security 5GC SBA.…”
Section: Introductionmentioning
confidence: 99%
“…To improve the security of the multimedia network, the academic community has proposed a moving target defense (MTD) [7] technology and a cyber mimic defense (CMD) technology [8]. On the basis of MTD, CMD technology provides a dynamic heterogeneous redundancy (DHR) architecture, which uses the active transformation of functionally equivalent heterogeneous executive bodies to change the components of the information system, therefore realizing network, platform, environment, software, structure, and data dynamic changes or migrations.…”
Section: Introductionmentioning
confidence: 99%