
@Article{jiot.2021.014921,
AUTHOR = {Mingxing Zhu, Yansong Wang, Ruyun Zhang, Tianning Zhang, Heyuan Li, Hanguang Luo, Shunbin Li},
TITLE = {Research on the Key Techniques of TCP Protocol Normalization for Mimic  Defense Architecture},
JOURNAL = {Journal on Internet of Things},
VOLUME = {3},
YEAR = {2021},
NUMBER = {3},
PAGES = {99--107},
URL = {http://www.techscience.com/jiot/v3n3/46019},
ISSN = {2579-0080},
ABSTRACT = {The Mimic Defense (MD) is an endogenous security technology with 
the core technique of Dynamic Heterogeneous Redundancy (DHR) architecture. 
It can effectively resist unknown vulnerabilities, backdoors, and other security 
threats by schedule strategy, negative feedback control, and other mechanisms. 
To solve the problem that Cyber Mimic Defense devices difficulty of supporting 
the TCP protocol. This paper proposes a TCP protocol normalization scheme for 
DHR architecture. Theoretical analysis and experimental results show that this 
scheme can realize the support of DHR-based network devices to TCP protocol 
without affecting the security of mimicry defense architecture.},
DOI = {10.32604/jiot.2021.014921}
}



