期刊首页 优先出版 当期阅读 过刊浏览 作者中心 关于期刊 English

《中国工程科学》 >> 2016年 第18卷 第6期 doi: 10.15302/J-SSCAE-2016.06.013

拟态防御基础理论研究综述

1. 中国人民解放军信息工程大学数学工程与先进计算国家重点实验室,郑州 450001;

2. 中国人民解放军信息工程大学国家数字交换系统工程技术研究中心,郑州 450002

资助项目 :中国工程院重大咨询项目“网络空间安全战略研究”(2015-ZD-10);国家重点研发计划 (2016YFB0800101, 2016YFB0800100); 数学与先进计算国家重点实验室开放课题 (2015A14);国家自然科学基金创新研究群体项目 (61521003);国家自然科学基金项目 (61572520,61602512) 收稿日期: 2016-10-21 修回日期: 2016-11-01 发布日期: 2016-12-13 15:28:28.000

下一篇 上一篇

摘要

随着互联网的发展,网络空间安全问题已成为关系到国家安全的大问题。本文首先介绍了一些经典的网络安全防御技术;其次介绍了拟态防御技术,包括拟态防御系统的构成、拟态防御的科学问题及其理论框架,对比传统网络防御技术,分析了拟态防御系统的有效性;最后对拟态防御基础理论还需要解决的问题做了阐述。

图片

图 1

参考文献

[ 1 ] $$$Kenkre P S, Pai A, Colaco L. Real time intrusion detection and pre-vention system[C] //Satapathy S C, Biswal B N, Udgata S K, et al. Proceedings of the 3rd international conference on frontiers of intelli-gent computing: Theory and applications (FICTA)2014.
Zhang H G, Han W B, Lai X J, et al. Survey on cyberspace secu-rity [J]. Scientia Sinica Informationis, 2016, 46 (2):125–164. 链接1

[ 2 ] Wu J X. Mimic security defense in cyber space [J]. Secrecy Science and Technology, 2014, 10(1): 4–9.
Jajodia S, Ghosh A K, Swarup V, et al, editors. Moving target defense—Creating asymmetric uncertainty for cyber threats [M]. New York: Springer Publishing Company, 2011. 链接1

[ 3 ] Powell D, Stroud R. Project IST-1999-11583 malicious- and acciden-tal-fault tolerance for internet applications: Conceptual model and ar-chitecture of MAFTIA [R]. Newcastle: University of Newcastle upon Tyne, 2003.
Evans D, Nguyen-Tuong A, Knight J. Effectiveness of moving target defenses [M]// Jajodia S, Ghosh A K, Swarup V, et al, edi-tors. Moving Target Defense—Creating asymmetric uncertainty for cyber threats. New York: Springer Publishing Company, 2011: 29–48. 链接1

[ 4 ] Jajodia S, Ghosh A K, Swarup V, et al. Moving target defense: Creat-ing asymmetric uncertainty for cyber threats [M]. New York: Springer, 2011.
Han Y J, Lu W L, Xu S H. Characterizing the power of moving target defense via cyber epidemic dynamics [C]// HotSoS’14 pro-ceedings of the 2014 symposium and bootcamp on the science of security. New York: Association for Computing Machinery (ACM), 2014: 1–12. 链接1

[ 5 ] Gupta V, Lam V, Ramasamy HG V, et al. Dependability and perfor-mance evaluation of intrusion-tolerant server architectures [M]. Berlin: Springer, 2003.
Zhang X Y,Li Z B. Overview on moving target defense tech-nology [J].Communications Technology, 2013, 46 (6): 111–113. Chinese. 链接1

[ 6 ] Wang F, Jou F, Gong F, et al. SITAR: A scalable intrusion-tolerant architecture for distributed services [C]// Proceedings of the 2001 IEEE— Workshop on information assurance and security. New York: United States Military Academy, 2003.
Zhuang R, DeLoach S A, Ou X M . Towards a theory of moving target defense[C]// MTD’14 proceedings of the first ACM work-shop on moving target defense. New York: ACM, 2014: 31–40. 链接1

[ 7 ] Malkhi D, Reiter M. Byzantine quorum systems [J]. Distributed Com-puting, 1998, 11(4): 203–213.
Shi L Y, Jia C F, Lv S W. Research on end hopping for active net-work confrontation[J]. Journal on Communications, 2008, 29 (2): 106–110. Chinese. 链接1

[ 8 ] Kewley D L, Bouchard J F. DARPA information assurance program dynamic defense experiment summary [J]. IEEE Transactions on Systems, Man, and Cybernetics. Part A, Systems and Humans, 2001, 31(4): 331–336.
Li Z T, Xu X D. The analysis of dynamic honeypot and its design [J]. Journal of Huazhong University of Science and Technology (Nature Science Edition). 2005, 33 (2): 86–88. Chinese. 链接1

[ 9 ] Okhravi H, Hobson T, Bigelow D, et al. Finding focus in the blur of moving-target techniques [J]. IEEE Security & Privacy, 2014, 12(2): 16–26.
Shi L Y, Jiang L L, Liu X, et al. Game theoretic analysis for the feature of mimicry honeypot [J]. Journal of Electronics & Infor-mation Technology, 2013, 35 (5): 1063–1068. Chinese. 链接1

相关研究