期刊文献+

基于BSG的拟态Web服务器调度策略研究 被引量:7

Research on scheduling strategy of mimic Web server based on BSG
下载PDF
导出
摘要 拟态Web服务器系统是基于拟态防御模型构建的内生安全防御系统。为了提升服务器的安全性和执行体资源的利用率,在具体的攻击场景下利用Bayesian-Stackelberg博弈方法,结合异构执行体之间的差异性,构建出基于攻防博弈的执行体调度模型,设计出场景化的最优调度策略。最后通过一个实例验证了模型和策略的可行性和有效性,相比于随机均匀调度策略安全性有明显提升,相较于最大差异性调度策略能有效提升资源利用率和动态随机性。 The mimic Web server system is an endogenous security defense system based on the mimic defense model.In order to improve the security of the server and the utilization of the execution resources,the Bayesian-Stackelberg game model and the difference of heterogeneous actuators was combined,constructs an actuator scheduling model based on offensive and defensive games and design a scene-based scheduling strategy in the specific attack scenario.Finally,an example is given to verify the feasibility and effectiveness of the model and strategy.Compared with the random uniform scheduling strategy,the security is significantly improved,and compared with the maximum differential scheduling strategy,the resource utilization,dynamic and randomness can be effectively improved.
作者 王晓梅 杨文晗 张维 杨镇 WANG Xiaomei;YANG Wenhan;ZHANG Wei;YANG Zhen(The Information Engineering University, Zhengzhou 450001 China;Shandong Province Bureau of Statistics, Jinan 250021 China)
出处 《通信学报》 EI CSCD 北大核心 2018年第A02期112-120,共9页 Journal on Communications
基金 国家重点研发计划基金资助项目(No.2017YFB0803201 No.2016YFB0800104) 上海市科学技术委员会科研计划基金资助项目(No.16DZ1120502)~~
关键词 拟态Web服务器 异构执行体 调度策略 Bayesian-Stackelberg博弈 mimic Web server heterogeneous actuators scheduling strategy Bayesian-Stackelberg game
  • 相关文献

参考文献6

二级参考文献61

  • 1冯登国,张阳,张玉清.信息安全风险评估综述[J].通信学报,2004,25(7):10-18. 被引量:308
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3冯萍慧,连一峰,戴英侠,李闻,张颖君.面向网络系统的脆弱性利用成本估算模型[J].计算机学报,2006,29(8):1375-1382. 被引量:28
  • 4张永铮,方滨兴,迟悦,云晓春.用于评估网络信息系统的风险传播模型[J].软件学报,2007,18(1):137-145. 被引量:76
  • 5Nicol D M, Liljenstam M. Models and analysis of active worm defense//Lecture Notes in Computer Science, 2005, 3685:38-53
  • 6Nash John. Equilibrium points in n-person games. Proceedings of the National Academy of Sciences, 1950, (36) : 48-49
  • 7Hamilton S N, Miller W L, Ott A, Saydjari O S. The role of game theory in information warfare//Proceedings of the 4th Information Survivability Workshop. Vancouver, Canada, 2002 : 45-46
  • 8Schneier B. Attack trees. Dr. Dobb' s Journal, 1999, 24 (12) : 21-29
  • 9Moore Andrew P, Ellison Robert J, Linger Richard C. Attack modeling for information security and survivability. Technical Note: CMU/SEI-2001-TN-001, 2001
  • 10Dacier M. Towards quantitative evaluation of computer security. Institut National Polytechnique de Toulouse, 1994

共引文献410

同被引文献106

引证文献7

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部