浏览全部资源
扫码关注微信
[ "张汝云(1973- ),男,博士,之江实验室工业互联网研究中心研究员,主要研究方向为工业互联网内生安全、新型网络架构、工业网络计算等。" ]
[ "李合元(1986- ),男,之江实验室工业互联网研究中心工程师,主要研究方向为工业互联网内生安全、时间敏感网络等。" ]
[ "李顺斌(1990- ),男,博士,之江实验室工业互联网研究中心助理研究员,主要研究方向为异构计算、可重构计算与工业互联网内生安全等。" ]
网络出版日期:2021-03,
纸质出版日期:2021-03-20
移动端阅览
张汝云, 李合元, 李顺斌. 有限异构资源条件下的工业控制拟态调度算法[J]. 电信科学, 2021,37(3):57-65.
Ruyun ZHANG, Heyuan LI, Shunbin LI. Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints[J]. Telecommunications science, 2021, 37(3): 57-65.
张汝云, 李合元, 李顺斌. 有限异构资源条件下的工业控制拟态调度算法[J]. 电信科学, 2021,37(3):57-65. DOI: 10.11959/j.issn.1000-0801.2021047.
Ruyun ZHANG, Heyuan LI, Shunbin LI. Mimic security scheduling algorithm for industrial control under limited heterogeneous resource constraints[J]. Telecommunications science, 2021, 37(3): 57-65. DOI: 10.11959/j.issn.1000-0801.2021047.
网络空间拟态防御技术是应对信息系统未知漏洞后门攻击的有效手段,其安全性与执行体的数量、异构化程度以及具体的裁决调度策略紧密相关。然而在工业控制领域,工业应用的生态资源相对封闭,可实现的异构执行体个数受限。针对上述问题,提出一种适用于有限异构资源约束条件下的工业控制拟态调度算法。算法通过引入执行体上线保护寄存器、周期清洗定时器等,能够根据运行环境自适应选择合适的执行体上线,可有效防范N-1模与N模攻击。实验结果表明,所提出的三余度工业控制拟态调度算法,可自适应根据环境特性选择合适的执行体上线,即使在高强度攻击环境下,依然能保持99.24%的高可用概率。
Cyberspace mimic defense technology is an effective method to deal with backdoor attacks on unknown vulnerabilities in information systems.Its security is closely related to the number and the heterogeneity of the executors and the scheduling strategy.However
in the field of industrial control
the ecological resources of industrial application are relatively closed
and the number of realizable heterogeneous executors is limited.To solve the above problems
a mimic scheduling algorithm for industrial control under the constraints of limited heterogeneous resources was proposed.The experimental results show that the proposed algorithm for triple-redundancy mimic industrial control system was able to select a suitable executor to go online according to environmental characteristics adaptively.Even in a high-intensity attack environment
it can still maintain a high availability probability of 99.24%.
HU H , WU J , WANG Z , et al . Mimic defense:a designed-in cybersecurity defense framework [J ] . IET Information Security , 2017 , 12 ( 3 ): 226 - 237 .
MA B L , ZHANG Z . Security research of redundancy in mimic defense system [C ] // Proceedings of 3rd IEEE International Conference on Computer and Communications (ICCC) . Piscataway:IEEE Press , 2017 : 2910 - 2914 .
马海龙 , 伊鹏 , 江逸茗 , 等 . 基于动态异构冗余机制的路由器拟态防御体系结构 [J ] . 信息安全学报 , 2017 , 2 ( 1 ): 29 - 42 .
MA H L , YI P , JIANG Y M , et al . Dynamic heterogeneous redundancy based router architecture with Mimic defenses [J ] . 2017 , 2 ( 1 ): 29 .
沈丛麒 , 陈双喜 , 吴春明 . 基于信誉度与相异度的自适应拟态控制器研究 [J ] . 通信学报 , 2018 , 39 ( Z2 ): 173 - 180 .
SHEN C Q , CHEN S X , WU C M . Adaptive mimic defensive controller framework based on reputation and dissimilarity [J ] . Journal on Communications , 2018 , 39 ( Z2 ): 173 - 180 .
陈利跃 , 孙歆 , 吴春明 , 等 . 一种基于异构度的拟态执行体调度模型研究 [C ] // 第一届“先进计算与防御技术”会议 . 北京:人民邮电出版社 , 2018 : 494 - 500 .
CHEN L Y , SUN X , WU C M , et al . A heterogeneous-based mimic execution scheduling model [C ] // Proceedings of the first national conference on advanced computing and defense . Beijing:People’s Posts and Telecom Press , 2018 : 494 - 500 .
魏帅 , 于洪 , 顾泽宇 , 等 . 面向工控领域的拟态安全处理机架构 [J ] . 信息安全学报 , 2017 , 2 ( 1 ): 54 - 73 .
WEI S , YU H , GU Z Y , et al . Architecture of mimic security processor for industry control system [J ] . Journal of Cyber Security , 2017 , 2 ( 1 ): 54 - 73 .
赵长海 , 晏海华 , 金茂忠 . 基于编译优化和反汇编的程序相似性检测方法 [J ] . 北京航空航天大学学报 , 2008 ( 6 ): 711 - 715 .
ZHAO C H , YAN H H , JIN M Z . Approach based on compiling optimization and disassembling to detect program similarity [J ] . Journal of Beijing University of Aeronautics and Astronautics , 2008 ( 6 ): 711 - 715 .
LIN S , LIU Q , WU Y , et al . A self-adaptive timeout mechanism in Mimic Defense System [C ] // Proceedings of 2017 8th IEEE International Conference on Software Engineering and Service Science (ICSESS) . Piscataway:IEEE Press , 2017 : 588 - 591 .
GARCIA M , BESSANI A , GASHI I , et al . Analysis of OS diversity for intrusion tolerance [J ] . Software:Practice and Experience (accepted for publication) , 2013 .
邬江兴 . 网络空间内生安全——拟态防御与广义鲁棒控制 [M ] . 北京 : 科学出版社 , 2020 .
WU J X . Cyberspace endogenous security:Mimic defense and generalized robust control [M ] . Beijing : Science Press , 2020 .
0
浏览量
424
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构