浏览全部资源
扫码关注微信
1. 浙江华云信息科技有限公司,浙江 杭州310027
2. 国网浙江省电力有限公司电力科学研究院,浙江 杭州310027
3. 国网浙江省电力有限公司,浙江 杭州310027
4. 浙江大学,浙江 杭州310058
5. 嘉兴职业技术学院,浙江 嘉兴314036
[ "秦俊宁(1972- ),男,浙江华云信息科技有限公司高级工程师,主要研究方向为信息安全管理" ]
[ "韩嘉佳(1983- ),女,国网浙江省电力有限公司电力科学研究院高级工程师,主要研究方向为网络安全" ]
[ "周升(1985- ),男,国网浙江省电力有限公司高级工程师,主要研究方向为网络安全" ]
[ "吴春明(1967- ),男,浙江大学教授、博士生导师,主要研究方向为人工智能、柔性可重构网络体系、软件定义网络、网络主动防御创新安全技术等" ]
[ "陈双喜(1980- ),男,嘉兴职业技术学院讲师,浙江大学博士生,主要研究方向为网络空间安全的渗透与主动防御" ]
[ "赵若琰(1998- ),女,浙江大学硕士生,主要研究方向为云安全、拟态防御" ]
[ "张江瑜(1998- ),男,浙江大学硕士生,主要研究方向为新型主动防御" ]
网络出版日期:2020-05,
纸质出版日期:2020-05-20
移动端阅览
秦俊宁, 韩嘉佳, 周升, 等. 基于异构冗余架构的拟态防御建模技术[J]. 电信科学, 2020,36(5):31-38.
Junning QIN, Jiajia HAN, Sheng ZHOU, et al. Modeling of the mimic defense based on heterogeneous redundancy[J]. Telecommunications science, 2020, 36(5): 31-38.
秦俊宁, 韩嘉佳, 周升, 等. 基于异构冗余架构的拟态防御建模技术[J]. 电信科学, 2020,36(5):31-38. DOI: 10.11959/j.issn.1000-0801.2020143.
Junning QIN, Jiajia HAN, Sheng ZHOU, et al. Modeling of the mimic defense based on heterogeneous redundancy[J]. Telecommunications science, 2020, 36(5): 31-38. DOI: 10.11959/j.issn.1000-0801.2020143.
介绍了网络安全发展的不平衡现状,对渗透测试的主要危害和机理模型进行描述,分析并发现了现存的多种传统防御手段均存在其固有缺点;而拟态防御模型的新方法可以通过动态选择执行体集,适应性地改变系统组成,使得攻击者获得的攻击信息失效,相同攻击难以维持或再现,基于攻击链模型对传统防御技术和拟态防御技术进行了分析和对比,论证了拟态防御在攻击链的多个阶段均具有防护作用;最后,通过实验验证了拟态防御的有效性和优越性,并对该模型进行了总结和展望。
The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described
and the inherent shortcomings of many existing traditional defense methods were analyzed.However
new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model
the traditional defensetechnology and mimic defense technology were analyzed and compared
and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally
the effectiveness and superiority of the mimic defense was verified by experiments
and the model was summarized and prospected.
SUBRAHMANIAN V S , OVEKGONN M , DUMITRAS T , et al . The global cyber-vulnerability report [J ] . Springer Int’l Publishing , 2015 ( 10 ): 33 - 64 .
China Information Technology Security Evaluation Center . China national vulnerability database of information security [EB ] . 2015 .
XU H , CHEN X , ZHOU J , et al . Research on basic problems of cognitive network intrusion prevention [C ] // Proceedings of 9th International Conference on Computational Intelligence and Security (CIS) . Piscataway:IEEE Press , 2013 : 514 - 517 .
CHUNG C J , KHATKAR P , XING T , et al . NICE:network intrusion detection and countermeasure selection in virtual network systems [J ] . IEEE Transaction on Dependable and Secure Computing , 2013 , 10 ( 4 ): 198 - 211 .
MADA B B , GOSEVAP K , VAIDYANATHAN K , et al . A method for modeling and quantifying the security attributes of intrusion tolerant systems [J ] . Performance Evaluation , 2004 , 56 ( 14 ): 167 - 186 .
WU J X . Research on cyberspace mimic defense [J ] . Journal of Information Security , 2016 , 1 ( 4 ): 1 - 10 .
仝青 , 张铮 , 张为华 , 等 . 拟态防御 Web 服务器设计与实现 [J ] . 软件学报 , 2017 , 28 ( 4 ): 883 - 897 .
TONG Q , ZHANG Z , ZHANG W H , et al . Design and implementation of mimic defense Web server [J ] . Journal of Software , 2017 ( 4 ): 883 - 897 .
邬江兴 . 拟态计算与拟态安全防御的原意和愿景 [J ] . 电信科学 , 2014 , 30 ( 7 ): 2 - 7 .
WU J X . The original intention and vision of mimic computing and mimic security defense [J ] . Telecommunications Science , 2014 , 30 ( 7 ): 2 - 7 .
National Science and Technology Council . Trustworthy cyberspace:strategic plan for the federal cybersecurity research and development program [EB ] . 2011 .
邬江兴 . 网络空间拟态防御原理 [M ] . 北京 : 科学出版社 , 2018 : 317 - 367 .
WU J X . Cyber mimic defense [M ] . Beijing : Science PressPress , 2018 : 317 - 367 .
VOAS J , GHOSH A , CHARRON F , et al . Reducing uncertainty about common-mode failures [C ] // Proceedings of IEEE Symposium on Software Reliability Engineering (SRE’ 97) . Piscataway:IEEE Press , 1997 : 308 - 319 .
LECITIN G . Optimal structure of fault-tolerant software systems [J ] . Reliability Engineering & System Safety , 2005 , 8 ( 3 ): 286 - 295 .
LIU C , LI C Q , QIU G W . Research on intruder countermeasures based on CobaltStrike and office vulnerabilities [J ] . Cyberspace Security , 2018 ( 1 ): 56 - 61 .
0
浏览量
329
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构