Research on mimic decision method based on deep learning
Due to software and hardware differentiation, the problem of false positives mistakenly identified as network attack behavior caused by inconsistent mimic decision results frequently occurs.Therefore, a mimic decision method based on deep learning was proposed.By constructing an unsupervised autoenc...
| Published in: | Tongxin xuebao |
|---|---|
| Main Authors: | Xiaohan YANG, Guozhen CHENG, Wenyan LIU, Shuai ZHANG, Bing HAO |
| Format: | Article |
| Language: | Chinese |
| Published: |
Editorial Department of Journal on Communications
2024-02-01
|
| Subjects: | |
| Online Access: | http://www.joconline.com.cn/thesisDetails#10.11959/j.issn.1000-436x.2024047 |
Similar Items
Research on mimic decision method based on deep learning
by: Xiaohan YANG, et al.
Published: (2024-02-01)
by: Xiaohan YANG, et al.
Published: (2024-02-01)
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
by: Zhengbin ZHU, et al.
Published: (2021-05-01)
A differential feedback scheduling decision algorithm based on mimic defense
by: Ming GAO, et al.
Published: (2020-05-01)
by: Ming GAO, et al.
Published: (2020-05-01)
A differential feedback scheduling decision algorithm based on mimic defense
by: Ming GAO, et al.
Published: (2020-05-01)
by: Ming GAO, et al.
Published: (2020-05-01)
Microservice Security Framework for IoT by Mimic Defense Mechanism
by: Fei Ying, et al.
Published: (2022-03-01)
by: Fei Ying, et al.
Published: (2022-03-01)
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01)
by: Jiangxing Wu
Published: (2014-07-01)
Meaning and Vision of Mimic Computing and Mimic Security Defense
by: Jiangxing Wu
Published: (2014-07-01)
by: Jiangxing Wu
Published: (2014-07-01)
Design and implementation of adaptive mimic voting device oriented to persistent connection
by: Dacheng ZHOU, et al.
Published: (2022-06-01)
by: Dacheng ZHOU, et al.
Published: (2022-06-01)
Design and implementation of adaptive mimic voting device oriented to persistent connection
by: Dacheng ZHOU, et al.
Published: (2022-06-01)
by: Dacheng ZHOU, et al.
Published: (2022-06-01)
Method against process control-flow hijacking based on mimic defense
by: Chuanxing PAN, et al.
Published: (2021-01-01)
by: Chuanxing PAN, et al.
Published: (2021-01-01)
Method against process control-flow hijacking based on mimic defense
by: Chuanxing PAN, et al.
Published: (2021-01-01)
by: Chuanxing PAN, et al.
Published: (2021-01-01)
Markov game modeling of mimic defense and defense strategy determination
by: Xingming ZHANG, et al.
Published: (2018-10-01)
by: Xingming ZHANG, et al.
Published: (2018-10-01)
Markov game modeling of mimic defense and defense strategy determination
by: Xingming ZHANG, et al.
Published: (2018-10-01)
by: Xingming ZHANG, et al.
Published: (2018-10-01)
Implementation architecture of mimic security defense based on SDN
by: Zhen-peng WANG, et al.
Published: (2017-10-01)
by: Zhen-peng WANG, et al.
Published: (2017-10-01)
Design, implementation and formal verification of BGP proxy for mimic router
by: Jin ZHANG, et al.
Published: (2023-03-01)
by: Jin ZHANG, et al.
Published: (2023-03-01)
Design, implementation and formal verification of BGP proxy for mimic router
by: Jin ZHANG, et al.
Published: (2023-03-01)
by: Jin ZHANG, et al.
Published: (2023-03-01)
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01)
by: Junning QIN, et al.
Published: (2020-05-01)
Modeling of the mimic defense based on heterogeneous redundancy
by: Junning QIN, et al.
Published: (2020-05-01)
by: Junning QIN, et al.
Published: (2020-05-01)
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
by: Hailong MA, et al.
Published: (2022-04-01)
by: Hailong MA, et al.
Published: (2022-04-01)
Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology
by: Hailong MA, Tao HU, Yiming JIANG, Yanze QU, et al.
Published: (2022-04-01)
by: Hailong MA, Tao HU, Yiming JIANG, Yanze QU, et al.
Published: (2022-04-01)
Location-Aware Measurement for Cyber Mimic Defense: You Cannot Improve What You Cannot Measure
by: Zhe Huang, et al.
Published: (2023-08-01)
by: Zhe Huang, et al.
Published: (2023-08-01)
Mimic defense authentication method for physical access control
by: Qinglei ZHOU, et al.
Published: (2020-06-01)
by: Qinglei ZHOU, et al.
Published: (2020-06-01)
Mimic defense authentication method for physical access control
by: Qinglei ZHOU, et al.
Published: (2020-06-01)
by: Qinglei ZHOU, et al.
Published: (2020-06-01)
Timeout threshold estimation algorithm in mimic multiple executors architecture
by: Delei NIE, et al.
Published: (2018-10-01)
by: Delei NIE, et al.
Published: (2018-10-01)
Endogenous security architecture of Ethernet switch based on mimic defense
by: Ke SONE, et al.
Published: (2020-05-01)
by: Ke SONE, et al.
Published: (2020-05-01)
Endogenous security architecture of Ethernet switch based on mimic defense
by: Ke SONE, et al.
Published: (2020-05-01)
by: Ke SONE, et al.
Published: (2020-05-01)
Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
by: Ruyun ZHANG, et al.
Published: (2021-03-01)
by: Ruyun ZHANG, et al.
Published: (2021-03-01)
Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints
by: Ruyun ZHANG, et al.
Published: (2021-03-01)
by: Ruyun ZHANG, et al.
Published: (2021-03-01)
Adaptive defense model for critical assets against unknown network threats
by: HAO Xiaorong, et al.
Published: (2025-03-01)
by: HAO Xiaorong, et al.
Published: (2025-03-01)
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01)
by: Qinrang LIU, et al.
Published: (2018-07-01)
Heterogeneous redundancies scheduling algorithm for mimic security defense
by: Qinrang LIU, et al.
Published: (2018-07-01)
by: Qinrang LIU, et al.
Published: (2018-07-01)
Research on Persistent Storage-Oriented Mimic Defense Technology in Container Clouds
by: Daoqing LIU, Hongchao HU, Shumin HUO
Published: (2024-02-01)
by: Daoqing LIU, Hongchao HU, Shumin HUO
Published: (2024-02-01)
A Mimic Arbitration Optimization Method Based on Heterogeneous Degree of Executors
by: WU Zhaoqi, ZHANG Fan, GUO Wei, WEI Jin, XIE Guangwei
Published: (2020-05-01)
by: WU Zhaoqi, ZHANG Fan, GUO Wei, WEI Jin, XIE Guangwei
Published: (2020-05-01)
Differential Game‑based Mimic Defense Scheduling Strategy in Power Systems
by: GU Liang, et al.
Published: (2025-05-01)
by: GU Liang, et al.
Published: (2025-05-01)
Key-area cyberspace mimic defense against data-oriented attacks
by: Chen Ping, et al.
Published: (2025-01-01)
by: Chen Ping, et al.
Published: (2025-01-01)
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
by: Ting WU, et al.
Published: (2021-03-01)
by: Ting WU, et al.
Published: (2021-03-01)
Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition
by: Ting WU, et al.
Published: (2021-03-01)
by: Ting WU, et al.
Published: (2021-03-01)
Evaluation of mimic defense strategy based on M-FlipIt game model
by: Shaohu DING, et al.
Published: (2020-07-01)
by: Shaohu DING, et al.
Published: (2020-07-01)
Evaluation of mimic defense strategy based on M-FlipIt game model
by: Shaohu DING, et al.
Published: (2020-07-01)
by: Shaohu DING, et al.
Published: (2020-07-01)
Similar Items
-
Research on mimic decision method based on deep learning
by: Xiaohan YANG, et al.
Published: (2024-02-01) -
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
Research progress of mimic multi-execution scheduling algorithm
by: Zhengbin ZHU, et al.
Published: (2021-05-01) -
A differential feedback scheduling decision algorithm based on mimic defense
by: Ming GAO, et al.
Published: (2020-05-01) -
A differential feedback scheduling decision algorithm based on mimic defense
by: Ming GAO, et al.
Published: (2020-05-01)
