拟态防御基础理论研究综述

斯雪明, 王伟, 曾俊杰, 杨本朝, 李光松, 苑超, 张帆

中国工程科学 ›› 2016, Vol. 18 ›› Issue (6) : 62-68.

PDF(380 KB)
PDF(380 KB)
中国工程科学 ›› 2016, Vol. 18 ›› Issue (6) : 62-68. DOI: 10.15302/J-SSCAE-2016.06.013
专题研究
Original article

拟态防御基础理论研究综述

作者信息 +

A Review of the Basic Theory of Mimic Defense

Author information +
History +

摘要

随着互联网的发展,网络空间安全问题已成为关系到国家安全的大问题。本文首先介绍了一些经典的网络安全防御技术;其次介绍了拟态防御技术,包括拟态防御系统的构成、拟态防御的科学问题及其理论框架,对比传统网络防御技术,分析了拟态防御系统的有效性;最后对拟态防御基础理论还需要解决的问题做了阐述。

Abstract

With the development of the Internet, cyberspace security issues have become a major concern related to national security. This paper first introduces some classic network defense technology. Next, it introduces the technology of mimic defense, including mimic defense systems, related scientific problems, and the theoretical framework of mimicry defense. The effectiveness of a mimic defense system is also analyzed in comparison with a traditional network defense technology. Finally, some problems worthy of study are presented regarding the basic theory of mimic defense.

关键词

拟态防御 / 网络空间 / 移动目标防御 / 拟态变换

Keywords

mimic defense / cyberspace / moving target defense / mimicry transformation

引用本文

导出引用
斯雪明, 王伟, 曾俊杰. 拟态防御基础理论研究综述. 中国工程科学. 2016, 18(6): 62-68 https://doi.org/10.15302/J-SSCAE-2016.06.013

参考文献

[1]
$$$Kenkre P S, Pai A, Colaco L. Real time intrusion detection and pre-vention system[C] //Satapathy S C, Biswal B N, Udgata S K, et al. Proceedings of the 3rd international conference on frontiers of intelli-gent computing: Theory and applications (FICTA)2014.
[2]
Wu J X. Mimic security defense in cyber space [J]. Secrecy Science and Technology, 2014, 10(1): 4–9.
[3]
Powell D, Stroud R. Project IST-1999-11583 malicious- and acciden-tal-fault tolerance for internet applications: Conceptual model and ar-chitecture of MAFTIA [R]. Newcastle: University of Newcastle upon Tyne, 2003.
[4]
Jajodia S, Ghosh A K, Swarup V, et al. Moving target defense: Creat-ing asymmetric uncertainty for cyber threats [M]. New York: Springer, 2011.
[5]
Gupta V, Lam V, Ramasamy HG V, et al. Dependability and perfor-mance evaluation of intrusion-tolerant server architectures [M]. Berlin: Springer, 2003.
[6]
Wang F, Jou F, Gong F, et al. SITAR: A scalable intrusion-tolerant architecture for distributed services [C]// Proceedings of the 2001 IEEE— Workshop on information assurance and security. New York: United States Military Academy, 2003.
[7]
Malkhi D, Reiter M. Byzantine quorum systems [J]. Distributed Com-puting, 1998, 11(4): 203–213.
[8]
Kewley D L, Bouchard J F. DARPA information assurance program dynamic defense experiment summary [J]. IEEE Transactions on Systems, Man, and Cybernetics. Part A, Systems and Humans, 2001, 31(4): 331–336.
[9]
Okhravi H, Hobson T, Bigelow D, et al. Finding focus in the blur of moving-target techniques [J]. IEEE Security & Privacy, 2014, 12(2): 16–26.
基金
中国工程院重大咨询项目“网络空间安全战略研究”(2015-ZD-10);国家重点研发计划 (2016YFB0800101, 2016YFB0800100);数学与先进计算国家重点实验室开放课题 (2015A14);国家自然科学基金创新研究群体项目 (61521003);国家自然科学基金项目(61572520,61602512)
PDF(380 KB)

Accesses

Citation

Detail

段落导航
相关文章

/