Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

A comprehensive evaluation of diversity systems based on mimic defense

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Zhuang R, Deloach S A, Ou X. A model for analyzing the effect of moving target defenses on enterprise networks. In: Proceedings of the 9th Annual Cyber and Information Security Research Conference, Oak Ridge, 2014. 73–76

  2. Eskridge T C, Carvalho M M, Stoner E, et al. VINE: a cyber emulation environment for MTD experimentation. In: Proceedings of the 2nd ACM Workshop on Moving Target Defense, Denver, 2015. 43–47

  3. Gallagher M, Biernacki L, Chen S, et al. Morpheus: a vulnerability-tolerant secure architecture based on ensembles of moving target defenses with churn. In: Proceedings of the 24th International Conference on Architectural Support for Programming Languages and Operating Systems, Providence, 2019. 469–484

  4. Okhravi H, Hobson T, Bigelow D, et al. Finding focus in the blur of moving-target techniques. IEEE Secur Privacy, 2014, 12: 16–26

    Article  Google Scholar 

  5. Wang F, Gong F, Sargor C, et al. SITAR: a scalable intrusion-tolerant architecture for distributed services. In: Proceedings of Workshop on Information Assurance and Security, Niagra Falls, 2003. 153–155

  6. Hu H C, Chen F C, Wang Z P. Performance evaluations on DHR for cyberspace mimic defense. J Cyber Secur, 2016, 1: 40–51

    Google Scholar 

  7. Tong Q, Zhang Z, Zhang W H. Design and implementation of mimic defense web server. J Softw, 2017, 28: 883–897

    Google Scholar 

  8. Yong W, Qiang D, Dick S. Security evaluation using software diversity measurement: an ecological approach. In: Proceedings of the 2016 International Conference on Software Engineering Research and Practice, Monte Carlo Resor, 2016. 95–101

Download references

Acknowledgements

This work was supported by Foundation for Innovative Research Groups of National Natural Science Foundation of China (Grant No. 61521003) and National Key Research and Development Program of China (Grant No. 2018YFB0804004).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yunfei Guo.

Additional information

Conclusion

In this study, we propose the diversity system as the research to grasp the difference between temporal and spatial diversity. Moreover, with the Trojan horse attack experiments, the defense ability, cost, and response delay of the diversity systems with different configurations are evaluated and compared with each other.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tong, Q., Guo, Y. A comprehensive evaluation of diversity systems based on mimic defense. Sci. China Inf. Sci. 64, 229304 (2021). https://doi.org/10.1007/s11432-020-3008-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-020-3008-1