Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 438-441.

• Information Security • Previous Articles     Next Articles

Management Information System Based on Mimic Defense

CHANG Xiao-lin1,2, FAN Yong-wen1, ZHU Wei-jun1, LIU Yang1   

  1. (School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China)1;
    (School of software,Henan University,Kaifeng,Henan 475000,China)2
  • Online:2019-11-10 Published:2019-11-20

Abstract: Safety management information system(MIS) affects the normal operations of many enterprises and organizations.In view of the shortcomings of existing security protection methods for information management systems,this paper proposed a management information system based on Mimic Defense(Mimic Management Information Systems,MMIS).Firstly,redundant execution set is constructed for presentation layer,business logic layer and data servicela-yer.Secondly,execution set is dynamically scheduled by dynamic configurator.Finally,execution set is voted by voter.The simulation results show that MMIS has higher security than traditional MIS.

Key words: Management information system, Mimic defense, Diversity, Dynamic configuration, Mimic management information systems

CLC Number: 

  • TP315
[1]薛华成.管理信息系统(第六版) [M].北京:清华大学出版社,2012.
[3]AROMS E.NIST Special Publication 800-94 Guide to Intrusion Detection and Prevention Systems(IDPS)[M].USA,CreateSpace,2012.
[4] ZHUANG R,QIAN D F,ZHANG W J.A Survey of Intrusion Detection Technology Research[J].Journal of Chinese Computer Systems,2003,24(7):1113-1118.
[5]WANG J,KISSEL Z A.Data Encryption Algorithms[M].John Wiley & Sons Singapore Pte.Ltd,2009.
[6]CLINCY V,SHAHRIAR H.2018 IEEE 42nd Annual Computer Software and Applications Conference(COMPSAC)- Web Application Firewall:Network Security Models and Configuration[C]∥IEEE Computer Software & Applications Conference.IEEE,2018:835-836.
[12]GARCIA M,BESSANI A N,GASHI I,et al.OS diversity for intrusion tolerance:Myth or reality[C]∥IEEE/IFIP International Conference on Dependable Systems & networks.IEEE Computer Society,2011.
[16]CALLAHAN T,ALLMAN M,RABINOVICH M.On modern DNS behavior and properties[M].ACM,2013.
[1] CHEN Li-feng, ZHU Lu-ping. Encrypted Dynamic Configuration Method of FPGA Based on Cloud [J]. Computer Science, 2020, 47(7): 278-281.
[2] ZHANG Yan-hong, ZHANG Chun-guang, ZHOU Xiang-zhen, WANG Yi-ou. Diverse Video Recommender Algorithm Based on Multi-property Fuzzy Aggregate of Items [J]. Computer Science, 2019, 46(8): 78-83.
[3] ZHANG Xue-fu, ZENG Pan, JIN Min. Cancer Classification Prediction Model Based on Correlation and Similarity [J]. Computer Science, 2019, 46(7): 300-307.
[4] LI Shan-shan, CHEN Li, TANG Yu-ting, WANG Yi-lin, YU Zhong-hua. Automatic Extraction of Diversity Keyphrase by Utilizing Integer Liner Programming [J]. Computer Science, 2019, 46(6A): 56-59.
[5] GUAN Xiao-qiang, PANG Ji-fang, LIANG Ji-ye. Randomization of Classes Based Random Forest Algorithm [J]. Computer Science, 2019, 46(2): 196-201.
[6] ZHANG Jie-xin, PANG Jian-min, ZHANG Zheng, TAI Ming, LIU Hao. QoS Quantification Method for Web Server with Mimic Construction [J]. Computer Science, 2019, 46(11): 109-118.
[7] WANG Wei, YANG Ben-chao, LI Guang-song, SI Xue-ming. Security Analysis of Heterogeneous Redundant Systems [J]. Computer Science, 2018, 45(9): 183-186.
[8] SHI Jin-ping,LI Jin,HE Feng-zhen. Diversity Recommendation Approach Based on Social Relationship and User Preference [J]. Computer Science, 2018, 45(6A): 423-427.
[9] ZHANG Yu-jia, PANG Jian-min, ZHANG Zheng and WU Jiang-xing. Mimic Security Defence Strategy Based on Software Diversity [J]. Computer Science, 2018, 45(2): 215-221.
[10] SHAN Tian-yu, GUAN Yu-yang. Differential Evolution Algorithm with Adaptive Population Size Reduction Based on Population Diversity [J]. Computer Science, 2018, 45(11A): 160-166.
[11] CAO Min-zi, ZHANG Lin-lin, BI Xue-hua, ZHAO Kai. Personalized (α,l)-diversity k-anonymity Model for Privacy Preservation [J]. Computer Science, 2018, 45(11): 180-186.
[12] XIA Jun, LIU Jun-fa, JIANG Xin-long, CHEN Yi-qiang. Incremental Indoor Localization for Device Diversity Issues [J]. Computer Science, 2018, 45(10): 69-77.
[13] WANG Zhong-min, ZHANG Shuang and HE Yan. Selective Ensemble Learning Human Activity Recognition Model Based on Diversity Measurement Cluster [J]. Computer Science, 2018, 45(1): 307-312.
[14] HE Xu, JING Xiao-ning, FENG Chao and CHENG Yue. Diversity-guided FPSO Algorithm for Solving Air Refueling Region Deplaying Problem [J]. Computer Science, 2017, 44(Z11): 547-551.
[15] YE Xiang, ZHANG Guo-an and WU Min. Research on Performance of Cooperative Communication Based on Constrained Area Relay in VANET [J]. Computer Science, 2017, 44(6): 102-107.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .