Endogenous security architecture of Ethernet switch based on mimic defense
Aiming at the unknown vulnerabilities and unknown backdoor security threats faced by Ethernet switches,a switch endogenous security architecture based on mimicry defense theory was proposed.The theoretical basis,construction mode and security mechanism of the architecture ware introduced,the algorit...
Saved in:
Main Authors: | Ke SONE, Qinrang LIU, Shuai WEI, Wenjian ZHANG, Libo TAN |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2020-05-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020098/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01) -
Implementation architecture of mimic security defense based on SDN
by: Zhen-peng WANG, et al.
Published: (2017-10-01) -
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01) -
Mimic defense authentication method for physical access control
by: Qinglei ZHOU, et al.
Published: (2020-06-01)