期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Research on the Key Techniques of TCP Protocol Normalization for Mimic Defense Architecture
1
作者 Mingxing Zhu Yansong Wang +4 位作者 Ruyun Zhang Tianning Zhang heyuan li Hanguang Luo Shunbin li 《Journal on Internet of Things》 2021年第3期99-107,共9页
The Mimic Defense(MD)is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy(DHR)architecture.It can effectively resist unknown vulnerabilities,backdoors,and other security thr... The Mimic Defense(MD)is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy(DHR)architecture.It can effectively resist unknown vulnerabilities,backdoors,and other security threats by schedule strategy,negative feedback control,and other mechanisms.To solve the problem that Cyber Mimic Defense devices difficulty of supporting the TCP protocol.This paper proposes a TCP protocol normalization scheme for DHR architecture.Theoretical analysis and experimental results show that this scheme can realize the support of DHR-based network devices to TCP protocol without affecting the security of mimicry defense architecture. 展开更多
关键词 Mimic defense TCP protocol NORMALIZATION
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部