2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) 2017
DOI: 10.1109/cyberc.2017.39
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Framework for Zero-Day Attacks Detection and Response with Cyberspace Mimic Defense Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Qi et al [21] proposed Mcad-SA, an aware decision-making security architecture with multiple controllers, which exploits heterogeneity and redundancy from different controllers to prevent an attack proactively. Based on the mimic defense theory and technology, Liu et al [22] proposed a framework against zero-day attacks. To protect the security of distributed storage systems, Li et al [23] presented a storage architecture for mimic defense (SAMD).…”
Section: Related Workmentioning
confidence: 99%
“…Qi et al [21] proposed Mcad-SA, an aware decision-making security architecture with multiple controllers, which exploits heterogeneity and redundancy from different controllers to prevent an attack proactively. Based on the mimic defense theory and technology, Liu et al [22] proposed a framework against zero-day attacks. To protect the security of distributed storage systems, Li et al [23] presented a storage architecture for mimic defense (SAMD).…”
Section: Related Workmentioning
confidence: 99%
“…Cyber mimic defence involves using redundant alternative processing units of different but equivalent functionality to increase the robustness of a system to adversarial input. This approach has previously been applied in network defence to detect zero-day attacks (see for example Liu et al [38]). The use of a second speech recognition system to increase the robustness of a voice-controlled system to attack has parallels to this approach.…”
Section: Defences Against Attacks On Speech Recognitionmentioning
confidence: 99%
“…Similar to the use of two different speech recognition systems as a defence against attacks on speech recognition, performing natural language understanding with respect to two or more languages rather than just one in order to increase the robustness of this process against malicious input has some commonality with the cyber mimic defence approach of using equivalent but different functionality as a security mechanism as described for example by Liu et al [38].…”
Section: Defences Against Attacks On Natural Language Understandingmentioning
confidence: 99%