期刊文献+

动态异构冗余系统的安全性分析 被引量:14

Security Analysis of Dynamic Heterogeneous Redundant System
下载PDF
导出
摘要 威胁网络空间安全的主要原因是漏洞和后门问题。为解决网络空间中基于未知漏洞、后门或病毒木马等不确定性的威胁,针对拟态防御的典型架构——动态异构冗余(DHR)系统,建立概率数学模型。从输出一致率、系统攻击成功率等角度讨论系统的安全性,通过对模型的求解和分析,得到DHR系统的攻击成功率的表达式,并给出DHR系统的性质。分析结果表明,DHR系统的抗攻击能力优于静态异构冗余系统。 The main causes of threats to cyberspace security are vulnerabilities and backdoor problems.In order to solve the threats based on unknown vulnerabilities,backdoor or virus Trojans in cyberspace,a probabilistic mathematical model is established for the typical architecture of mimic defense,Dynamic Heterogeneous Redundancy(DHR)system.The security of the system is discussed from the perspective of output consistency rate and system attack success rate.Through the solution and analysis of the model,the expression of the attack success rate of the DHR system is obtained,and some properties of the DHR system are analyzed.Analysis results show that the DHR system has better anti-attack capability than the static heterogeneous redundant system.
作者 王伟 曾俊杰 李光松 斯雪明 杨本朝 WANG Wei;ZENG Junjie;LI Guangsong;SI Xueming;YANG Benchao(State Key Laboratory of Mathematical Engineering and Advanced Computing,Information Engineering University, Zhengzhou 450001,China;Sias International University,Zhengzhou University,Zhengzhou 450001,China)
出处 《计算机工程》 CAS CSCD 北大核心 2018年第10期42-45,50,共5页 Computer Engineering
基金 国家重点研发计划项目(2016YFB0800100 2016YFB0800101) 国家自然科学基金创新研究群体项目(61521003) 国家自然科学基金(61602512)
关键词 拟态防御 动态异构冗余 漏洞 后门 主动防御 mimic defense Dynamic Heterogeneous Redundancy(DHR) vulnerability backdoor active defense
  • 相关文献

参考文献7

二级参考文献28

  • 1苘大鹏,张冰,周渊,杨武,杨永田.一种深度优先的攻击图生成方法[J].吉林大学学报(工学版),2009,39(2):446-452. 被引量:23
  • 2庞伟正,金瑞琪,王成武.一种规则引擎的实现方法[J].哈尔滨工程大学学报,2005,26(3):385-389. 被引量:27
  • 3殷丽华,方滨兴.入侵容忍系统安全属性分析[J].计算机学报,2006,29(8):1505-1512. 被引量:27
  • 4Allen J. , Christie A. , Fithen W. et al. State of the practice of intrusion detection technologies. Carnegie Mellon, SEI, Technical Report: CMU/SEI-99-TR-028, 2000
  • 5Fraga J. S. , Powell D.. A fault- and intrusion-tolerant file system. In: Proceedings of the 3rd International Conference on Computer Security, Dublin, Ireland, 1985, 203-218
  • 6Jonsson E. , Olovsson T.. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 1997, 23(4): 235-245
  • 7Gong F, , Goseva-PopstojanovaVaid-yanathan K. , Trivedi K. ,K., Wang F., Wang R.Muthusamy B.. Characterizing intrusion tolerant systems using a state transition model.In: Proceedings of the DARPA Information Survivability Conference and Exposition(DISCEX II), 2001, 2:211-221
  • 8Jha S. , Wing J. M.. Survivability analysis of networked systems. In: Proceedings of the 23rd International Conference on Software Engineering, Toronto, Canada, 2001, 307-317
  • 9Ortalo R. , Deswarte Y. , Kaaniche M.. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 1999, 25(5) :633-650
  • 10Sheyner O. , Haines J. , Jha S. , Lippmann R. , Wing J. M..Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA, 2002, 273-284

共引文献340

同被引文献104

引证文献14

二级引证文献103

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部