Research Article
Mimic Encryption Box for Network Multimedia Data Security
Table 9
Comparison between this scheme and other schemes.
| Scheme | Dynamic | Diversity | Intrusion detection | Encrypted transmission | Virtualization | Hardware protection | Defensive effect |
| Aydeger et al. [9] | √ | √ | √ | | | | Defend against crossfire attacks |
| Aydeger et al. [10] | √ | √ | √ | | √ | | Resist crossfire attacks and provide network forensics |
| Wang et al. [12] | √ | √ | | | | | Increase the scanning space |
| Zhao et al. [15] | √ | √ | | | | | Defend against sniffer attack |
| Tang et al. [26] | √ | √ | | √ | | | Provide dynamic encryption; resist both exhaustive and analysis attacks |
| Lin et al. [34] | | | √ | | | √ | Detect the security of packets |
| Our system | √ | √ | √ | √ | | √ | Provide dynamic network and encryption and access control filtering; resist ciphertext-only and key exhaustion attacks |
|
|