{"title":"模拟平台主要组成部分的研究","authors":"Bo Zhang, Zesheng Xi, Yu-Na Wang, Chuan He","doi":"10.1117/12.2667434","DOIUrl":null,"url":null,"abstract":"Cyber Mimic Defense (CMD) is a new generation of active defense technology after firewall, intrusion and other traditional defense technology. It aims to deal with uncertain threats in the network environment with visual uncertainty. This paper briefly introduces the architecture and principle of CMD and defines four main elements of the current simulation platform: system architecture, heterogeneous policy, scheduling policy and voting policy. Combined with examples, the four elements are respectively summarized. The system architecture is divided into C mode and D mode, and the heterogeneous strategy includes implementation mode, implementation method and synchronization mode. Scheduling policies are classified into offline policies and online policies. Voting policies include voting algorithms, voting levels, and delay control.","PeriodicalId":345723,"journal":{"name":"Fifth International Conference on Computer Information Science and Artificial Intelligence","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on the main elements of mimic platforms\",\"authors\":\"Bo Zhang, Zesheng Xi, Yu-Na Wang, Chuan He\",\"doi\":\"10.1117/12.2667434\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber Mimic Defense (CMD) is a new generation of active defense technology after firewall, intrusion and other traditional defense technology. It aims to deal with uncertain threats in the network environment with visual uncertainty. This paper briefly introduces the architecture and principle of CMD and defines four main elements of the current simulation platform: system architecture, heterogeneous policy, scheduling policy and voting policy. Combined with examples, the four elements are respectively summarized. The system architecture is divided into C mode and D mode, and the heterogeneous strategy includes implementation mode, implementation method and synchronization mode. Scheduling policies are classified into offline policies and online policies. Voting policies include voting algorithms, voting levels, and delay control.\",\"PeriodicalId\":345723,\"journal\":{\"name\":\"Fifth International Conference on Computer Information Science and Artificial Intelligence\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-03-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Fifth International Conference on Computer Information Science and Artificial Intelligence\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1117/12.2667434\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Fifth International Conference on Computer Information Science and Artificial Intelligence","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.2667434","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cyber Mimic Defense (CMD) is a new generation of active defense technology after firewall, intrusion and other traditional defense technology. It aims to deal with uncertain threats in the network environment with visual uncertainty. This paper briefly introduces the architecture and principle of CMD and defines four main elements of the current simulation platform: system architecture, heterogeneous policy, scheduling policy and voting policy. Combined with examples, the four elements are respectively summarized. The system architecture is divided into C mode and D mode, and the heterogeneous strategy includes implementation mode, implementation method and synchronization mode. Scheduling policies are classified into offline policies and online policies. Voting policies include voting algorithms, voting levels, and delay control.