期刊文献+

跳变信息服务系统研究 被引量:4

Research on Hopping Information Service System
下载PDF
导出
摘要 针对复杂网络空间对抗条件下提升信息服务系统动态主动防御能力的需求,基于动目标防御思想提出了一种跳变信息服务系统架构及构建方法。首先利用多态化的软件栈模板构建出由不同异构虚拟服务器组成的服务器池;然后,通过审计清洗、服务请求调度、服务器动态管控等模块之间的交互控制,实现根据各虚拟服务器的状态信息和负载情况进行服务请求调度和服务器状态切换,在保证服务质量的前提下使得信息服务系统随时间动态、随机地变化。 Facing more and more threats from the cyberspace, it has become significant to improve the active and dynamic defense capacity of information service system. Based on the concept of moving target defense, the architecture and construction method for hopping information service system is proposed. Firstly, the server pool consisting of heterogeneous virtual servers is constructed using templates of diverse software stacks. Further, according to the status and load of the virtual server, request scheduling and status switching are implemented by coordination of audit and clean module, request scheduling module, together with dynamic management module. Then the information service system can hop dynamically and randomly over time, with assurance of quality of service.
作者 赵鑫 ZHAO Xin(Science and Technology on Information Systems Engineering Laboratory, Nanjing 21007, Chin)
出处 《软件》 2018年第3期204-208,共5页 Software
关键词 动目标防御 跳变信息服务 网络空间安全 Moving target defense Hopping information service Cyberspace security
  • 相关文献

参考文献12

二级参考文献65

  • 1赵红言,许柯,许杰,赵绪民.计算机网络安全及防范技术[J].陕西师范大学学报(哲学社会科学版),2007,36(S2):80-82. 被引量:26
  • 2余勇,林为民.基于等级保护的电力信息安全监控系统的设计[J].计算机科学,2012,39(S3):440-442. 被引量:20
  • 3陈星,贾卓生.工业控制网络的信息安全威胁与脆弱性分析与研究[J].计算机科学,2012,39(S2):188-190. 被引量:29
  • 4夏丹丹,李刚,程梦梦,于亮.入侵检测系统综述[J].网络安全技术与应用,2007(1):35-36. 被引量:37
  • 5Cybersecurity Game —Change Research & DevelopmentRecommendations. NITRD CSIA IWG[EB/OLj. http://www.nitrd.gov/pubs/CSlA_IWG_Cybersecurity_GameChange_R.D_Recommendations_20100513.pdf.
  • 6Pratyusa K.Manadhata, Jeannette M.Wing. A Formal Model for aSystem’ s Attack Surface. S.Jajodia et al. (eds.). Moving Target Defense:Creating Asymmetric Uncertainty for Cyber Threatsjj]. Advances inInformation Security 54,DOI 10.1007/978—1 —4614—0977—9_"1, SpringerScience+Business Media,LLC 2011. ppl—28.
  • 7Shacham, H., Page, M., PfafF, B. On the Effectiveness of Address-Space Randomization [C]. Proceedings of the 11th ACM conference onComputer and communications security, pp 298—307, 2004.
  • 8Todd Jackson, Babak Salamat, Andrei Homescu, ea al. Compiler-Generated Software Diversity. S.Jajodia et al. (eds.). Moving TargetDefense: Creating Asymmetric Uncertainty for Cyber Threats [J]. Advancesin Information Security 54,DOI 10.1007/978 — 1 —461 4 —0977 —9_1,Springer Science+Business Media’LLC 2011. pp77—98.
  • 9Mihai Christodorescu, Matthew Fredrikson, Somesh Jha, ea al. End—to—End Software Diversification of Internet Services. S.Jajodia et al. (eds.).Moving Target Defense: Creating Asymmetric Uncertainty for CyberThreats [J], Advances in Information Security 54,DOI 10.1007/978—1 —4614—0977—9—1,Springer Science+Business Media’LLC 2011. ppl 17 —130.
  • 10Justin Yackoski, Harry Bullen, Xiang Yu, ea al. Applying Self-Shielding Dynamics to the Network Architecture. S.Jajodia et al.(eds.).Moving Target Defense II: Application of Game Theory andAdversarial Modeling[J]. Advances in Information Security lOO’DOI10.1007/978—1~4614~5416—8_6, Springer Science+Business Media NewYork 2013. pp 97—116.

共引文献302

同被引文献22

引证文献4

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部