期刊文献+

动态弹性安全防御技术及发展趋势 被引量:3

Technologies and Development Trend of Dynamic Resiliency for Security Defense
下载PDF
导出
摘要 动态弹性安全防御(DRSD,Dynamic Resiliency for Security Defense)是国际上赛博安全领域新近出现的研究热点。动态弹性安全防御技术完全不同于以往的赛博安全研究思路,其通过多样的、不断变化的构建、评价和部署机制及策略来增加攻击者的攻击难度及代价,有效限制脆弱性暴露及被攻击的机会,增加系统弹性。充分利用时间、空间复杂性增强系统安全。文中对动态弹性安全防御技术进行了综述,首先介绍了动态弹性安全防御的研究现状,然后介绍了动态弹性安全防御的基本原理,并分别从网络配置随机化、网络服务组件多态化、软件多态化、拟态计算等方面介绍了当前具有代表性的动态弹性安全防御技术,最后讨论了动态弹性安全防御技术的优势和问题,对其应用前景进行了展望。 DRSD( Dynamic Resiliency for Security Defense) is the recent research hotspot in cyber security area.DRSD technologies,unlike the traditional cyber security research thinking,aim to increase the complexity and cost for attackers through diverse and continually-shifting establishment,analysis and deployment mechanisms and strategies,thus effectively limiting the exposure of vulnerabilities and opportunities for being attacked,and improving the system resiliency.DRSD takes full advantage of the time and spatial complexity to enhance the system security.This paper makes a review of DRSD technologies.Firstly it gives the current status of DRSD research,then proposes the fundamental principle of DRSD,and describes the typical DRSD technologies from the four aspects of network configuration randomization,network service components diversity,software diversity,and mimic computing,finally it discusses the superiorities,challenges and application prospects of DRSD technologies.
出处 《通信技术》 2015年第2期117-124,共8页 Communications Technology
基金 国家自然科学基金(No.61171501)~~
关键词 动态 弹性 安全防御 系统安全 dynamic resiliency security defense system security
  • 相关文献

参考文献23

  • 1Executive Office of the President, National Science andTechnology Council. Trustworthy Cyberspace : StrategicPlan for the Federal Cybersecurity Research and Develop-ment Program [ R ]. USA: http://www. whitehouse.gov/,2011.
  • 2SUSHIL J, ANUP K G, VIPIN S, et al. Moving TargetDefense - Creating Asymmetric Uncertainty for CyberThreats [ M]. New York, USA: Springer, 2011.
  • 3PRATYUSA K M, MANISH JAIN, DANIEL BILAR, etal. Moving Target Defense II—Application of Game Theoryand Adversarial Modeling [ M ]. New York,USA:Springer, 2013.
  • 4DAVID J JOHN, ROBERT W SMITH, WILLIAM HTURKETT, et al. Evolutionary based Moving Target Cy-ber Defense [ C ]//Proceedings of the 2014 ConferenceCompanion on Genetic and Evolutionary ComputationCompanion ( GECCO Comp 2014 ) . Vancouver, Cana-da: ACM, 2014: 1261-1268.
  • 5Yu Li, Rui Dai, Junjie Zhang. Morphing Communica-tions of Cyber-physical Systems Towards Moving-targetDefense [ C ] //Proceedings of IEEE International Confer-ence on Communications (ICC 2014) . Sydney, Austral-ia: IEEE, 2014: 592-598.
  • 6Argus lab, Kansas State University. Cybersecurity algo-rithms ,techniques being developed through anthropologymethods [ R]. ScienceDaily : www.sciencedaily.com/re-leases/2013/11/131107103406. htm, 2013.
  • 7ZHUANGRui, ZHANG Su, BARD AS A, et al. Investi-gating the Application of Moving Target Defenses to Net-work Security [ C ] //Proceedings of the 6th InternationalSymposium on Resilient Control Systems (ISRCS 2013).San Francisco/C A,USA : IEEE,2013 :162 -169.
  • 8SCOTT A DELOACH, OU Xinmin, ZHUANG Rui, etal. Model-driven, Moving-Target Defense for EnterpriseNetwork Security [ J ]. Lecture Notes in Computer Sci-ence, 2014, 8378: 137-161.
  • 9PAL P,SCHANTZ R, PAULOS A, et al. Managed Exe-cution Environment as a Moving - Target Defense Infra-structure [J] . Security & Privacy ,2014,12(2) :51—59.
  • 10MARCO M CARVALHO, THOMAS C ESKRIDGE,LARRY BUNCH, et al. A Human - Agent TeamworkCommand and Control Framework for Moving Target De-fense (MTC2) [ C ]//Proceedings of the Annual CyberSecurity and Information Intelligence Research Workshop(CSIIRW 2012) , Oak Ridge/Tennessee, USA : ACM,2012:11-14.

二级参考文献6

  • 1高常波,罗万伯,王科.计算机网络安全系统设计[J].通信技术,2003,36(3):46-47. 被引量:4
  • 2SUSHIL J, ANUP K G, VIPIN S, et. al. Moving Target Defense-Creating Asymmetric Uncertainty for Cyber Threats[M].[s.l.]:Springer Press, 2011:1.
  • 3NITRD CSIA IWG Cybersecurity Game-Change Research & Development Recommendations[R].U.S:NITRD, 2010.
  • 4MATTHEW D, STEPHEN G, WILLIAM U, et. al, MT6D: A Moving Target IPv6 Defense[C]// MILCOM. U.S: IEEE Communication Committee, 2011:1321-1326.
  • 5JAFAR H J, EHAB A, DUAN Q, Openflow Random Host Mutation: Transparent Moving Target Defense Using Software Defined Networking[J]. HotSDN, 2012(12): 127-132.
  • 6王正.网络安全中的防火墙技术探讨[J].通信技术,2008,41(8):218-220. 被引量:8

共引文献120

同被引文献28

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部