期刊文献+

军用无线网络动态安全防御技术研究 被引量:2

Dynamic Security Defense Application on Military Wireless Network
下载PDF
导出
摘要 随着军用无线网络的发展,安全问题变得越来越重要。但军用无线网络主要因循互联网体制,所采用的体系结构在设计之初就没有过多考虑安全问题,存在本质上的不安全因素,而通过"打补丁"附加安全机制的方式,使得当前的安全系统和网络变得越来越臃肿,严重地降低了网络性能。动态目标防御(moving target defense,MTD)理论的提出,彻底颠覆了过去那种静态、被动的安全防御思路,这种革命性的思路与无线网络协议的深入结合,将带来全新的网络体系,特别是它的很多思路与无线网络特性具有高度耦合性,将在未来军用无线网络中得到广泛的应用。 With the development of military wireless network, system security becomes even more important. However, the military wireless network always follows the principle of Internet, and its adopted architecture lacks security consideration in the beginning of design, thus in these systems exist essentially insecure factors. The traditional security mechanism usually posts security patches on the existing system, thus making the current security system and network more redundant, and leading to severe decrease of the net- work performance. The theory of MTD ( Moving Target Defense) is proposed to completely change the tra- ditional static and passive security defense mode. The thorough combination of revolutionary MTD technol- ogy with wireless network protocols would bring novel network architecture. In particular, many ideas of MTD technologies, for being highly coupled with the characteristics of wireless network, would be widely ap- plied to the future military wireless network.
出处 《通信技术》 2015年第7期830-834,共5页 Communications Technology
关键词 互联网安全 无线网络安全 军用无线网络 动态目标防御 Internet security wireless network security military wireless network moving target defense
  • 相关文献

参考文献10

  • 1林闯,雷蕾.下一代互联网体系结构研究[J].计算机学报,2007,30(5):693-711. 被引量:64
  • 2余镇全.构建无线网络安全防护体系[J].电子科技,2006,19(9):1-3. 被引量:3
  • 3张晓玉,李振邦.移动目标防御技术综述[J].通信技术,2013,46(6):111-113. 被引量:28
  • 4Executive Office of the President,National Science and Technology Council.Trustworthy Cyberspace:Strategic Plan for the Federal Cybersecurity Research and Development Program[R].USA:http://www.whitehouse.gov/,2011.
  • 5Sushil J,Anup K G,Vipin S,et al.Moving Target Defense-Creating Asymmetric Uncertainty for Cyber Threats[M].New York,USA:Springer,2011.
  • 6Pratyusa K M,Manish Jain,Daniel Bilar,et al.Moving Target Defense II-Application of Game Theory and Adversarial Modeling[M].New York,USA:Springer,2013.
  • 7David J John,Robert W Smith,William H Turkett,et al.Evolutionary based Moving Target Cyber Defense[C]//Proceedings of the 2014 Conference Companion on Genetic and Evolutionary Computation Companion(GECCO Comp 2014).Vancouver,Canada:ACM,2014:1261-1268.
  • 8LI Yu,DAI Rui,ZHANG Jun-jie.Morphing Communications of Cyber-Physical Systems Towards MovingTarget Defense[C]//Proceedings of IEEE International Conference on Communications(ICC 2014).Sydney,Australia:IEEE,2014:592-598.
  • 9ZHANG Rui,ZHANG Su,Bardas A,et al.Investigating the Application of Moving Target Defenses to Network Security[C]//Proceedings of the 6th International Symposium on Resilient Control Systems(ISRCS 2013).San Francisco/CA,USA:IEEE,2013:162-169.
  • 10汪涛主编.尤线刚络技术导论(第二版),清华大学出版社,2012年10月.

二级参考文献8

共引文献92

同被引文献21

  • 1邬江兴,张帆,罗兴国,等.拟态计算与拟态安全防御[J].计算机学会通讯,2015,11(1):8-14.
  • 2COLBAUGH R,GLASS K.Proactive Defense for Evolving Cyber Threats[C]//2011 IEEE International Conference on Intelligence and Security Informatics(ISI),Beijing,China,2011:125-130.
  • 3CHUANG I,SU W T,KUO Y H.Secure Dynamic Routing Protocols Based on CrossLayer Network Security Evaluation[C]//2012IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications(PIMRC),Sydney,NSW,2012:303-308.doi:10.1109/PIMRC.2012.6362800.
  • 4BALASUBRAMANIAM S,LEIBNITZ K,LIO P,et al.Biological Principles for Future Internet Architecture Design[J].Communications Magazine,IEEE,2011,49(7):44-52.doi:10.1109/MCOM.2011.5936154.
  • 5ZHOU H,WU C,JIANG M,et al.Evolving Defense Mechanism for Future Network Security[J].Communications Magazine,IEEE,2015,53(4):45-51.doi:10.1109/MCOM.2015.7081074.
  • 6ALA’DARABSEH M A A,JARARWEH Y,BENKHELIFA E,et al.SDSecurity:A Software Defined Security Experimental Framework[C]//Third Workshop on Cloud Computing Systems,Networks,and Applications(CCSNA-2015),London,UK,2015.
  • 7SHI L,JIANG L,LIU D,et al.Mimicry Honeypots:A Brief Introduction[C]//Networking and Mobile Computing(Wi COM),2012 8th International Conference on Wireless Communications,Shanghai,China,2012:1-4.doi:10.1109/Wi COM.2012.6478572.
  • 8FEINBERG Y.Strategic Communication[C]//Proceedings of the 13th Conference on Theoretical Aspects of Rationality and Knowledge,2011:1-11.
  • 9LIN F Y S,WANG Y S,HUANG M Y.Effective Proactive and Reactive Defense Strategies Against Malicious Attacks in a Virtualized Honeynet[J].Journal of Applied Mathematics,2013.
  • 10韦勇,连一峰,冯登国.基于信息融合的网络安全态势评估模型[J].计算机研究与发展,2009,46(3):353-362. 被引量:165

引证文献2

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部