Font Size: a A A

Research On Data Protection Architecture Based On Mimic Defense

Posted on:2020-05-06Degree:MasterType:Thesis
Country:ChinaCandidate:Y W FanFull Text:PDF
GTID:2428330575954517Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
In the background of informationization and the rapid development of internet technology,data security has become more and more important.Therefore,the methods of improve the security of data services provided by database server have become an important way to protect data security.Up to now,the existing defense techniques usually take some security strategies to the database server system and its network environment.These methods also improve the security of data services by encrypting the data transmitted over the network.Although these methods can improve data security to some extent.However,it is difficult for them to deal with some security threats such as unknown vulnerabilities and backdoors in server systems.To this end,a new dynamic heterogeneous,redundancy and random data security architecture,i.e.,Mimic Data Protection,MDP,based on mimic defense is proposed to deal with these unknown security threats.Firstly,the resource pools of heterogeneous redundancy database servers,encryption\decryption center and backup servers are constructed according to the data heterogeneous,data redundancy and data consistency.Second,the dynamic scheduling of execution bodies and the multi-mode decision or normalization of their output results are realized by using the mimic control layer,which is composed of scheduler,controller,input agent and adjudicator.The above mechanisms can achieve the purpose of increasing the cost of attacker.The simulation results show that compared with the non-mimic architecture,the new architecture with dynamic changes and other defense characteristics has higher security performance in the security of data services.
Keywords/Search Tags:Data security, Mimic Defense, Heterogeneous Redundancy, Randomness, Dynamic scheduling
PDF Full Text Request
Related items