期刊文献+

基于GSPN的拟态DNS构造策略研究 被引量:15

Research on Mimic DNS Architectural Strategy Based on Generalized Stochastic Petri Net
下载PDF
导出
摘要 网络空间拟态防御系统(Cyberspace Mimic Defense System, CMDS)采用动态异构冗余架构以及多模表决机制将不确定威胁转化为概率可控的事件,从而实现了自主可控、安全可信。为进一步研究拟态构造策略在不同干扰场景下的稳态可用性和感知安全性,本文采用广义随机Petri网(Generalized Stochastic Petri Net, GSPN)建模,分析了不同干扰场景下采用不同拟态构造策略对系统性能和构造成本的影响,实验结果表明拟态防御系统可以根据反馈控制信息对不同干扰场景进行策略替换,从而实现系统的稳定可用性和感知安全性。同时通过反馈控制能有效控制不同服务器解析时延差值,对实际拟态DNS系统部署有重要指导意义。 Cyberspace Mimic Defense System adopts dynamic heterogeneous redundant architecture with multi-mode voting mechanism to convert the deterministic or uncertain disturbance to a reliable event so as to achieve self-controllable,safe and reliable.To further study the reliability and awareness security of mimic constructing strategy in different interference scenarios,this paper establishes a model of cyberspace mimic defense system based on the generalized stochastic Petri nets(GSPN)and analyzes the effects of different strategies and interference scenarios in performance and cost.The results of simulations show that Mimic defense system can change strategy to make a tradeoff among stable availability,awareness security and cost in different interference scenarios based on feedback information.
作者 任权 邬江兴 贺磊 REN Quan;WU Jiangxing;HE Lei(National Digital Switching System Engineering&Technogical R&D Center,Zhengzhou 450001,China)
出处 《信息安全学报》 CSCD 2019年第2期37-52,共16页 Journal of Cyber Security
基金 国家网络安全专项课题(No.2017YFB0803201) 国家高技术研究发展计划("863"计划)课题(No.2015AA016102) 国家自然科学基金群体创新项目(No.61521003)
关键词 拟态防御 广义随机PETRI网 建模 策略与成本代价 可用性和感知安全性 Mimic defense generalized stochastic Petri net model architectural strategy and cost availability and awareness security
  • 相关文献

参考文献9

二级参考文献35

  • 1张永铮,云晓春,胡铭曾.基于特权提升的多维量化属性弱点分类法的研究[J].通信学报,2004,25(7):107-114. 被引量:35
  • 2林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 3WANG Xin-sheng SUN Han-xu.The New Fault Tolerant Onboard Computer for Microsatellite Missions[J].The Journal of China Universities of Posts and Telecommunications,2006,13(1):6-9. 被引量:1
  • 4Dacier M,Deswarte Y,Kaaniche M.Quantitative assessment of operational security models and tools.Technical Report,96493,LAAS,1996. 被引量:1
  • 5Ortalo R,Deswarte Y.Information systems security:Specification and quantitative evaluation.Technical Report,DeVa ESPRIT Long Term Research Project No.20072,the 2nd Year Report,LAAS-CNRS & INRIA,1997.561-584. 被引量:1
  • 6Ortalo R,Deswarte Y,Ka(a)niche M.Experimenting with quantitative evaluation tools for monitoring operational security.IEEE Trans.on Software Engineering,1999,25(5):633-650. 被引量:1
  • 7Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998. 被引量:1
  • 8Sheyner O.Scenario graphs and attack graphs[Ph.D.Thesis].Pittsburgh:Carnegie Mellon University,2004. 被引量:1
  • 9Sheyner O,Haines J,Jha S,Lippmann R,Wing JM.Automated generation and analysis of attack graphs.In:Hinton H,Blakley B,Abadi M,Bellovin S,eds.Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2002.273-284. 被引量:1
  • 10Jha S,Sheyner O,Wing JM.Minimization and reliability analyses of attack graphs.Technical Report,CMU-CS-02-109,Carnegie Mellon University,2002. 被引量:1

共引文献378

同被引文献98

引证文献15

二级引证文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部