Abstract

A current research trend is to combine multimedia data with artificial intelligence and process them on cloud servers. In this context, ensuring the security of multimedia cloud servers is critical, and the cyber mimic defence (CMD) technology is a promising approach to this end. CMD, which is an innovative active defence technology developed in China, can be applied in many scenarios. However, although the mathematical model is a key component of CMD, a universally acceptable mathematical model for theoretical CMD has not been established yet. In this work, the attack problems and modelling difficulties were extensively examined, and a comprehensive modelling theory and concepts were clarified. By decoupling the model from the input and output of the specific system scene, the modelling difficulties were effectively avoided, and the mathematical expression of the CMD mechanism was enhanced. Furthermore, the process characteristics of the attack behaviour were identified by using a specific mathematical mapping method. Finally, based on the decomposition problem of large prime factors and convolution operations, an intuitive and exclusive CMD mathematical model was proposed. The proposed model could clearly express the CMD mechanism and transform the problems of attack and defence in the CMD domain into corresponding mathematical problems. These aspects were considered to qualitatively assess the CMD security, and it was noted that a high level of security can be realized. Furthermore, the overhead of CMD was analyzed. Moreover, the proposed model can be directly programmed.

Highlights

  • With the development of information technology, multimedia has been widely applied in the human society

  • Multimedia cloud servers face nearly the same issues as those of cyberspace, such as network attacks and multimedia data protection. e multiple reports of network security incidents indicate that attackers mostly exploit the software and hardware vulnerabilities, and backdoor attacks constitute the majority of network security incidents

  • Cyber mimic defence [11] is a revolutionary defence technology of “game-changing” initiated by China. e development of cyber mimic defence (CMD) was inspired by the mimicry phenomenon and biological immune system in the biological world. e dynamic heterogeneous redundancy (DHR) architecture was used as the core architecture of the CMD

Read more

Summary

Introduction

With the development of information technology, multimedia has been widely applied in the human society. E CMD mechanism facilitates its application in the multimedia cloud server cluster environment. China has actively promoted the research on the theory and technology of CMD, and a theoretical system of CMD has been established [8, 9] and is considerably different from the static and fixed traditional systems In this context, it is necessary to clarify the technical aspects of the mechanism of the mimic defence at the theoretical level [10] and to establish an intuitive and exclusive mathematical model according to the CMD mechanism to formulate a mapping relationship with the mathematical aspects.

Background
Mathematical Knowledge Required for Modelling
Modelling Concept
Modelling
Mechanism
Row: 2
Simulation Environment Design
Conclusion and Future
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call