Table of Content

Open Access iconOpen Access

ARTICLE

crossmark

Research on the Key Techniques of TCP Protocol Normalization for Mimic Defense Architecture

by

Zhejiang Lab, Hangzhou, 310012, China

* Corresponding Author:Shunbin Li. Email: email

Journal on Internet of Things 2021, 3(3), 99-107. https://doi.org/10.32604/jiot.2021.014921

Abstract

The Mimic Defense (MD) is an endogenous security technology with the core technique of Dynamic Heterogeneous Redundancy (DHR) architecture. It can effectively resist unknown vulnerabilities, backdoors, and other security threats by schedule strategy, negative feedback control, and other mechanisms. To solve the problem that Cyber Mimic Defense devices difficulty of supporting the TCP protocol. This paper proposes a TCP protocol normalization scheme for DHR architecture. Theoretical analysis and experimental results show that this scheme can realize the support of DHR-based network devices to TCP protocol without affecting the security of mimicry defense architecture.

Keywords


Cite This Article

APA Style
Zhu, M., Wang, Y., Zhang, R., Zhang, T., Li, H. et al. (2021). Research on the key techniques of TCP protocol normalization for mimic defense architecture. Journal on Internet of Things, 3(3), 99-107. https://doi.org/10.32604/jiot.2021.014921
Vancouver Style
Zhu M, Wang Y, Zhang R, Zhang T, Li H, Luo H, et al. Research on the key techniques of TCP protocol normalization for mimic defense architecture. J Internet Things . 2021;3(3):99-107 https://doi.org/10.32604/jiot.2021.014921
IEEE Style
M. Zhu et al., “Research on the Key Techniques of TCP Protocol Normalization for Mimic Defense Architecture,” J. Internet Things , vol. 3, no. 3, pp. 99-107, 2021. https://doi.org/10.32604/jiot.2021.014921



cc Copyright © 2021 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1540

    View

  • 1105

    Download

  • 0

    Like

Share Link