Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 438-441.

• Information Security • Previous Articles     Next Articles

Management Information System Based on Mimic Defense

CHANG Xiao-lin1,2, FAN Yong-wen1, ZHU Wei-jun1, LIU Yang1   

  1. (School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China)1;
    (School of software,Henan University,Kaifeng,Henan 475000,China)2
  • Online:2019-11-10 Published:2019-11-20

Abstract: Safety management information system(MIS) affects the normal operations of many enterprises and organizations.In view of the shortcomings of existing security protection methods for information management systems,this paper proposed a management information system based on Mimic Defense(Mimic Management Information Systems,MMIS).Firstly,redundant execution set is constructed for presentation layer,business logic layer and data servicela-yer.Secondly,execution set is dynamically scheduled by dynamic configurator.Finally,execution set is voted by voter.The simulation results show that MMIS has higher security than traditional MIS.

Key words: Diversity, Dynamic configuration, Management information system, Mimic defense, Mimic management information systems

CLC Number: 

  • TP315
[1]薛华成.管理信息系统(第六版) [M].北京:清华大学出版社,2012.
[2]张梦.基于C/S结构的中小企业人事管理系统的设计与开发[J].计算机科学,2016,43(S1):547-550.
[3]AROMS E.NIST Special Publication 800-94 Guide to Intrusion Detection and Prevention Systems(IDPS)[M].USA,CreateSpace,2012.
[4] ZHUANG R,QIAN D F,ZHANG W J.A Survey of Intrusion Detection Technology Research[J].Journal of Chinese Computer Systems,2003,24(7):1113-1118.
[5]WANG J,KISSEL Z A.Data Encryption Algorithms[M].John Wiley & Sons Singapore Pte.Ltd,2009.
[6]CLINCY V,SHAHRIAR H.2018 IEEE 42nd Annual Computer Software and Applications Conference(COMPSAC)- Web Application Firewall:Network Security Models and Configuration[C]∥IEEE Computer Software & Applications Conference.IEEE,2018:835-836.
[7]邬江兴.网络空间拟态防御导论[M].北京,科学出版社,2017.
[8]邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10.
[9]多国顶尖“白帽黑客”对拟态防御网络设备和系统发起50余万次攻击测试无一次得手[EB/OL].新华网.http://m.xinhuanet.com/2018-05/12/c_129870684.htm,2018.
[10]熊斌.基于B/S三层架构OA系统的设计和实现[D].电子科技大学,2011.
[11]仝青,张铮,邬江兴.基于软硬件多样性的主动防御技术[J].信息安全学报,2017,2(1):1-12.
[12]GARCIA M,BESSANI A N,GASHI I,et al.OS diversity for intrusion tolerance:Myth or reality[C]∥IEEE/IFIP International Conference on Dependable Systems & networks.IEEE Computer Society,2011.
[13]周余阳,程光,郭春生,等.移动目标防御的攻击面动态转移技术研究综述[J].软件学报,2018,29(9):2799-2820.
[14]仝青,张铮,张为华,等.拟态防御Web服务器设计与实现[J].软件学报,2017,28(4):883-897.
[15]王禛鹏,扈红超,程国振.一种基于拟态安全防御的DNS框架设计[J].电子学报,2017(11):2705-2714.
[16]CALLAHAN T,ALLMAN M,RABINOVICH M.On modern DNS behavior and properties[M].ACM,2013.
[17]魏帅,于洪,顾泽宇,等.面向工控领域的拟态安全处理机架构[J].信息安全学报,2017,2(1):54-73.
[18]扈红超,陈福才,王禛鹏.拟态防御DHR模型若干问题探讨和性能评估[J].信息安全学报,2016,1(4):40-51.
[19]吴文青,唐应辉,兰绍军.修理设备可更换的k/n(G)表决可修系统[J].数学学报(中文版),2016,59(6):799-820.
[20]柏仲干.复杂系统Bayes可靠性评估方法研究及其应用软件的研制[D].长沙:国防科学技术大学,2003.
[1] WANG Yu-fei, CHEN Wen. Tri-training Algorithm Based on DECORATE Ensemble Learning and Credibility Assessment [J]. Computer Science, 2022, 49(6): 127-133.
[2] CHEN Zhuang, ZOU Hai-tao, ZHENG Shang, YU Hua-long, GAO Shang. Diversity Recommendation Algorithm Based on User Coverage and Rating Differences [J]. Computer Science, 2022, 49(5): 159-164.
[3] LIU Yi, MAO Ying-chi, CHENG Yang-kun, GAO Jian, WANG Long-bao. Locality and Consistency Based Sequential Ensemble Method for Outlier Detection [J]. Computer Science, 2022, 49(1): 146-152.
[4] YANG Lin, WANG Yong-jie, ZHANG Jun. FAWA:A Negative Feedback Dynamic Scheduling Algorithm for Heterogeneous Executor [J]. Computer Science, 2021, 48(8): 284-290.
[5] ZHOU Gang, GUO Fu-liang. Research on Ensemble Learning Method Based on Feature Selection for High-dimensional Data [J]. Computer Science, 2021, 48(6A): 250-254.
[6] CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281.
[7] ZHANG Yan-hong, ZHANG Chun-guang, ZHOU Xiang-zhen, WANG Yi-ou. Diverse Video Recommender Algorithm Based on Multi-property Fuzzy Aggregate of Items [J]. Computer Science, 2019, 46(8): 78-83.
[8] ZHANG Xue-fu, ZENG Pan, JIN Min. Cancer Classification Prediction Model Based on Correlation and Similarity [J]. Computer Science, 2019, 46(7): 300-307.
[9] LI Shan-shan, CHEN Li, TANG Yu-ting, WANG Yi-lin, YU Zhong-hua. Automatic Extraction of Diversity Keyphrase by Utilizing Integer Liner Programming [J]. Computer Science, 2019, 46(6A): 56-59.
[10] GUAN Xiao-qiang, PANG Ji-fang, LIANG Ji-ye. Randomization of Classes Based Random Forest Algorithm [J]. Computer Science, 2019, 46(2): 196-201.
[11] ZHANG Jie-xin, PANG Jian-min, ZHANG Zheng, TAI Ming, LIU Hao. QoS Quantification Method for Web Server with Mimic Construction [J]. Computer Science, 2019, 46(11): 109-118.
[12] WANG Wei, YANG Ben-chao, LI Guang-song, SI Xue-ming. Security Analysis of Heterogeneous Redundant Systems [J]. Computer Science, 2018, 45(9): 183-186.
[13] SHI Jin-ping,LI Jin,HE Feng-zhen. Diversity Recommendation Approach Based on Social Relationship and User Preference [J]. Computer Science, 2018, 45(6A): 423-427.
[14] ZHANG Yu-jia, PANG Jian-min, ZHANG Zheng and WU Jiang-xing. Mimic Security Defence Strategy Based on Software Diversity [J]. Computer Science, 2018, 45(2): 215-221.
[15] SHAN Tian-yu, GUAN Yu-yang. Differential Evolution Algorithm with Adaptive Population Size Reduction Based on Population Diversity [J]. Computer Science, 2018, 45(11A): 160-166.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy