Abstract
With the development and popularization of Internet technology, network security has become the focus of attention. Vulnerabilities and back doors are regarded as two of the main reasons of network security problems. Dynamic heterogeneous redundant (DHR) architecture is a typical framework of cyberspace mimic defense. It can make use of untrusted hardware and software components to construct a high reliable and high security information system. In this article, a mathematical model is set up for the DHR architecture, and the system security is characterized by vulnerability consistency rate and success rate of system attack. The antiattack ability of the DHR system is analyzed using the mathematical model.
Original language | English |
---|---|
Article number | e6035 |
Journal | Concurrency Computation Practice and Experience |
Volume | 34 |
Issue number | 12 |
DOIs | |
Publication status | Published - 30 May 2022 |
Keywords
- active defense
- backdoors
- heterogeneous redundancy
- mimic defense
- vulnerability