期刊文献+

基于区块链的网络级移动目标防御系统设计

Design of Network-level Moving Target Defense System Based on Blockchain
下载PDF
导出
摘要 网络级移动目标防御技术是应对诸如泛洪攻击等攻击手段的有效方式。但现有网络级移动目标防御系统多采用单一静态中央控制器,这种集中式的管理架构易带来单点故障以及数据不可信等风险。针对上述问题,本文提出一种基于区块链的网络级移动目标防御方案,通过PoW共识机制实现中央控制器的动态切换,解决集中式中央控制器带来的单点故障问题并提高其健壮性。此外,基于区块链所构建的分布式可信网络环境,在动态中央控制器中引入负载均衡与容灾备份机制,使得网络级移动目标防御系统具有良好的高并发服务请求能力以及遭遇致命网络攻击后的服务快速恢复能力。本文设计并实现了基于区块链的网络级移动目标防御原型系统并进行充分的性能测试实验。实验结果表明系统具有良好的可用性和鲁棒性。 The network-level moving target defense is an effective approach to deal with the cyber attacks,like flooding attack.However,the existing network-level moving target defense systems mostly adopt the static central controller.This kind of centralized management architecture is prone to risks such as single point of failure or untrusted data.To address the above problems,this paper proposes a scheme of network-level moving target defense system based on blockchain,which realizes dynamically switching the central controller through the PoW consensus mechanism and overcomes the single point of failure of it and improves its robustness.In addition,based on the distributed trusted network environment constructed by blockchain,this paper establishes load balancing mechanism and disaster-tolerant backup mechanism for the dynamic central controller,making the system have good performance in dealing with the high concurrent service requests and recovering quickly from paralysis.Finally,this paper designs and implements the prototype system of network-level moving target defense system based on blockchain.The test results show that the designed system has good availability and robustness.
作者 段鹏飞 兰茹 DUAN Peng-fei;LAN Ru(College of Oceanography & Space Informatics, China University of Petroleum(East China), Qingdao 266580, China)
出处 《计算机与现代化》 2021年第8期121-126,共6页 Computer and Modernization
基金 山东省自然科学基金资助项目(ZR2019MF034) 国家自然科学基金资助项目(61772551)。
关键词 移动目标防御 区块链 去中心化 负载均衡 容灾备份 moving target defense blockchain decentralization load balancing disaster-tolerant backup
  • 相关文献

参考文献8

二级参考文献63

  • 1李之棠,徐晓丹.动态蜜罐技术分析与设计[J].华中科技大学学报(自然科学版),2005,33(2):86-88. 被引量:19
  • 2李树军.基于协议转变的拒绝服务攻击技术的研究[J].计算机应用,2006,26(10):2323-2325. 被引量:4
  • 3LEE H, THING V. Port hopping for resilient networks[A]. Conf 60th IEEE Vehicular Technology[C]. 2004.3291-3295.
  • 4BADISHIY G. HERZBERG A, KEIDAR I, et al. Keeping denial-of-service attackers in the dark[A]. Int Symp Distributed Computing (DISC)[C]. Springer-Vedag, 2005.18-31.
  • 5SIFALAKIS M, SCHMID S, HUTCHISON D. Network address hopping: a mechanism to enhance data protection for packet communications[A]. ICC 2005[C]. 2005.1518 - 1523.
  • 6BBN Technologies. Applications that participate in their own defense[EB/OL].http://apod.bbn.com. 2002.
  • 7ATIGHETCHI M, PAL P, WEBBER E et al. Adaptive use of net- work-centric mechanisms in cyber-defense[A]. Proc 6th IEEE Int Syrup Object-Oriented Real-Tune Distributed Computing [C]. 2003. 183-192.
  • 8FERRARI L. The aglets-2.0.2 user's manual[EB/OL], http://aglets. sourceforge.net. 2004.
  • 9Zhuang R, DeLoach S A, and Ou X. Towards a theory of moving target defense[C]. Proceedings of the First ACM Workshop on Moving Target Defense, Scottsdale, Arizona, 2014: 31-40.
  • 10Jajodia S and Sun K. MTD 2014: first ACM workshop on moving target defense[C]. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, Arizona, 2014: 1550--1551.

共引文献769

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部