Paper
22 February 2023 Normalization method of encryption source in mimicry simulation system
Bo Zhang, Zesheng Xi, Lei Wang, Chuan He, Kun Cao, Yunfan Wang
Author Affiliations +
Proceedings Volume 12587, Third International Seminar on Artificial Intelligence, Networking, and Information Technology (AINIT 2022); 125870U (2023) https://doi.org/10.1117/12.2667625
Event: Third International Seminar on Artificial Intelligence, Networking, and Information Technology (AINIT 2022), 2022, Shanghai, China
Abstract
Although the mimic system can effectively defend against known or unknown vulnerabilities / backdoor attacks, some encryption protocols such as SSH will produce different encryption results on different executors, even with the same processor, the same operating system, the same encryption protocol and the same plaintext, which leads to difficulty in output arbitration. To solve this problem, this paper proposes an encryption source normalization method, which can make different executors generate same ciphertext by normalizing the source of the random number and synchronizing the length of output data, so that the output of heterogeneous executers can be successfully arbitrated by the scheduler. This method is verified by experiments using SSH protocol. Test results show that this method can effectively solve the encryption problem of mimic system.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Bo Zhang, Zesheng Xi, Lei Wang, Chuan He, Kun Cao, and Yunfan Wang "Normalization method of encryption source in mimicry simulation system", Proc. SPIE 12587, Third International Seminar on Artificial Intelligence, Networking, and Information Technology (AINIT 2022), 125870U (22 February 2023); https://doi.org/10.1117/12.2667625
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Switches

Defense and security

Defense systems

Operating systems

Technology

Border security

Computer architecture

Back to Top