2020
DOI: 10.1109/access.2020.3024847
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Model of Mimic Defense Based on Minimal L-Order Error Probability

Abstract: Mimic defense is an active defense theory, which aims to fundamentally change the "easy to attack and difficult to defend" situation of network security. In this paper, we propose an evaluation method based on the minimum probability of successful attack, and improve the evaluation scheme of historical confidence. We combine the two evaluation schemes with the TOPSIS (technique for order performance by similarity to ideal solution) algorithm, and finally form a complete heterogeneous variant dynamic scheduling… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 38 publications
(42 reference statements)
0
1
0
Order By: Relevance
“…Although the introduction of a feedback mechanism into the scheduling strategy algorithm is of great help to improving the defense performance of the mimic defense system, it is pity that there is still lacking a reliable feedback mechanism in the field of mimic defense scheduling algorithms. For example, Wu proposed a qualitative setting standard for feedback indicator in [27], but he did not give a specific quantitative setting method; Gao et al simply increase or decrease the feedback index value by the same factor in [41], which is disable to effectively reflect the real-time security of each executor by that feedback mechanism; In [49], Guoxi Chen et al proposed a feedback method that comprehensively considering the online hours and historical breached times of each executor. Although the mechanism is dynamic to a certain extent, it is still difficult to effectively prevent network attackers from repeating the previous successful attacks to online executors.…”
Section: A: Vulnerability Evaluation Of Each Mimic Component Layermentioning
confidence: 99%
“…Although the introduction of a feedback mechanism into the scheduling strategy algorithm is of great help to improving the defense performance of the mimic defense system, it is pity that there is still lacking a reliable feedback mechanism in the field of mimic defense scheduling algorithms. For example, Wu proposed a qualitative setting standard for feedback indicator in [27], but he did not give a specific quantitative setting method; Gao et al simply increase or decrease the feedback index value by the same factor in [41], which is disable to effectively reflect the real-time security of each executor by that feedback mechanism; In [49], Guoxi Chen et al proposed a feedback method that comprehensively considering the online hours and historical breached times of each executor. Although the mechanism is dynamic to a certain extent, it is still difficult to effectively prevent network attackers from repeating the previous successful attacks to online executors.…”
Section: A: Vulnerability Evaluation Of Each Mimic Component Layermentioning
confidence: 99%