期刊文献+

基于非相似余度架构的网络空间安全系统异构性量化方法 被引量:13

Heterogeneity Quantization Method of Cyberspace Security System Based on Dissimilar Redundancy Structure
下载PDF
导出
摘要 基于非相似余度架构(DRS)的网络空间安全技术是一种主动防御技术,其利用非相似性、冗余性等特性阻断或者扰乱网络攻击,以提高系统的可靠性和安全性。该文在研究异构性是如何提高系统的安全性的基础上,指出对异构性进行量化评估的重要性,将DRS的异构性定义为其执行体集的复杂性与差异性,并依此提出一种量化异构性的方法。实验结果表明,该方法可以将10个执行体集分为9类,而香浓-维纳指数、辛普森指数和Pielou指数只能分为4类。在理论上为DRS异构性量化评估提供了一种新方法,并为工程实现DRS系统提供了指导。 The Dissimilar Redundancy Structure (DRS) based cyberspace security technology is an active defense technology,which uses features such as dissimilarity and redundancy to block or disrupt network attacks to improve system reliability and security.By analyzing how heterogeneity can improve the security of the system,the importance of quantification of heterogeneity is pointed out and the heterogeneity of DRS is defined as the complexity and disparity of its execution set.A new method which is suitable for quantitative heterogeneity is also proposed.The experimental results show that this method can divide 10 execution sets into 9 categories,while the Shannon-Wiener index,Simpson index and Pielou index can only divide into 4 categories.This paper provides a new method to quantify the heterogeneity of DRS in theory,and provides guidance for engineering DRS systems.
作者 张杰鑫 庞建民 张铮 邰铭 刘浩 ZHANG Jiexin;PANG Jianmin;ZHANG Zheng;TAI Ming;LIU Hao(State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China)
出处 《电子与信息学报》 EI CSCD 北大核心 2019年第7期1594-1600,共7页 Journal of Electronics & Information Technology
基金 国家自然科学基金(61472447) 国家重点研发计划(2016YFB0800104) 上海市科学技术委员会科研计划(16DZ1120502)~~
关键词 网络空间安全 漏洞 非相似余度 异构性 量化方法 Cyberspace security Vulnerability Dissimilar redundancy Heterogeneity Quantification method
  • 相关文献

参考文献5

二级参考文献32

  • 1陈宗基,秦旭东,高金源.非相似余度飞控计算机[J].航空学报,2005,26(3):320-327. 被引量:41
  • 2秦旭东,陈宗基.基于Petri网的非相似余度飞控计算机可靠性分析[J].控制与决策,2005,20(10):1173-1176. 被引量:10
  • 3Elena Gabriela Barrantes,David H Ackley,Trek S Palmer,et al.Randomized instruction set emulation to disrupt binary code injection attacks[C] //CCS'03:Proceedings of the 10th ACM conference on Computer and communications security,New York,NY,USA,2003:281-289.
  • 4Sandeep Bhatkar,Daniel C DuVarney,Sekar r.Address obfuscation:an efficient approach to combat a board range of memory error exploits[C] //Proceedings of the 12th conference on USENIX Security Symposium,Berkeley,CA,USA,2003:8.
  • 5Cox B,Evans D,Filipi A,et al.N-variant systems-A secretless framework for security through diversity[C] //Proceedings of the 15th USENIX Security Symposium,August 2006.
  • 6Debin Gao,Michael K Reiter,Dawn Song.Behavioral distance for intrusion detection[C] //Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005),2005:63-81.
  • 7Debin Gao,Michael K Reiter,Dawn Song.Behavioral distance measurement using hidden markov models[C] //Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006),2006:19-40.
  • 8Geer D,Bace R,Gutmann P,et al.The cost of monopoly.Technical report,CCIA,2003.
  • 9Gaurav S Kc,Angelos D Keromytis,Vassilis Prevelakis.Countering code-injection attacks with instruction-set randomization[C] //Proceedings of the 10th ACM conference on Computer and communications security,New York,NY,USA,ACM,2003:272-280.
  • 10Richard C Linger.Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software[C] //HICSS'99:Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences-Volume 3,Washington,DC,USA,IEEE Computer Society,1999:3062.

共引文献128

同被引文献112

引证文献13

二级引证文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部