网络与信息安全学报 ›› 2022, Vol. 8 ›› Issue (3): 87-96.doi: 10.11959/j.issn.2096-109x.2021042

• 学术论文 • 上一篇    下一篇

容器云中基于信号博弈的容器迁移与蜜罐部署策略

李凌书, 邬江兴, 曾威, 刘文彦   

  1. 信息工程大学,河南 郑州 450001
  • 修回日期:2021-01-20 出版日期:2022-06-01 发布日期:2022-06-01
  • 作者简介:李凌书(1992− ),男,湖北恩施人,信息工程大学博士生,主要研究方向为拟态安全防御、网络欺骗
    邬江兴(1953− ),男,浙江嘉兴人,中国工程院院士,信息工程大学教授、博士生导师,主要研究方向为拟态安全防御、内生安全防御
    曾威(1997− ),男,河南信阳人,信息工程大学硕士生,主要研究方向为移动目标防御、云资源管理与调度
    刘文彦(1986− ),男,河南周口人,信息工程大学讲师,主要研究方向为云计算、网络功能虚拟化、云资源管理与调度
  • 基金资助:
    国家重点研发计划(2018YFB0804004);国家自然科学基金(62002383)

Strategy of container migration and honeypot deployment based on signal game in cloud environment

Lingshu LI, Jiangxing WU, Wei ZENG, Wenyan LIU   

  1. Information Engineering University, Zhengzhou 450001, China
  • Revised:2021-01-20 Online:2022-06-01 Published:2022-06-01
  • Supported by:
    The National Key R&D Program of China(2018YFB0804004);The National Natural Science Foundation of China(62002383)

摘要:

SaaS 云中的多租户共存和资源共享模式会带来严重的安全隐患。一方面逻辑上命名空间的软隔离容易被绕过或突破,另一方面由于共享宿主机操作系统和底层物理资源容易遭受同驻攻击,对容器云中数据可用性、完整性、机密性产生严重威胁。针对 SaaS 云服务容易遭受容器逃逸、侧信道等同驻攻击的问题,网络欺骗技术通过隐藏执行体的业务功能和特征属性,增加云环境的不确定度,降低攻击的有效性。针对容器易遭受同驻攻击的安全威胁,结合动态迁移、虚拟蜜罐等安全技术,研究经济合理的网络欺骗方法降低同驻攻击带来的安全威胁。具体而言,提出一种基于信号博弈的容器迁移与蜜罐部署策略。依据容器面临的安全威胁分析,使用容器迁移和蜜罐两种技术作为防御方法,前者基于移动目标防御的思想提高系统的不可探测性,后者通过布置诱饵容器或提供虚假服务来迷惑攻击者;鉴于网络嗅探是网络攻击链的前置步骤,将攻防过程建模为双人不完整信息的信号博弈,发送者根据自己类型选择释放一个信号,接收者仅能够获取到发送者释放的信号,而不能确定其类型。对这个完全但不完美的信息动态博弈构建博弈树,设置攻防双方不同策略组合的开销和收益;对攻防模型进行均衡分析确定最优的欺骗策略。实验结果表明,所提策略能够有效提高系统安全性,同时能够降低容器迁移频率和防御开销。

关键词: 云计算, 容器迁移, 蜜罐, 信号博弈

Abstract:

Multi-tenant coexistence and resource sharing in the SaaS cloud pose serious security risks.On the one hand, soft isolation of logical namespaces is easy to be bypassed or broken.On the other hand, it is easy to be subjected to co-resident attacks due to sharing of the host operating system and underlying physical resources.Therefore it poses a serious threat to data availability, integrity and confidentiality in the container cloud.Given the problem that SaaS cloud services are vulnerable to container escape and side-channel equivalent resident attack, network deception technology increases the uncertainty of the cloud environment and reduces the effectiveness of attack by hiding the business function and characteristic attributes of the executor.Aiming at the security threat caused by the co-resident attack, combining dynamic migration and virtual honeypot security technology, the economical and reasonable network deception method was studied.Specifically, a container migration and honeypot deployment strategy based on the signal game was proposed.According to the security threat analysis, container migration and honeypot were used as defense methods.The former improved the undetectability of the system based on the idea of moving to target defense, while the latter confused attackers by placing decoy containers or providing false services.Furthermore, since network reconnaissance was the pre-step of the network attack chain, the attack and defense process was modeled as a two-person signal game with incomplete information.The sender chose to release a signal according to his type, and the receiver could only obtain the signal released by the sender but could not determine the type.Then, a game tree was constructed for the complete but imperfect information dynamic game, and the costs and benefits of different strategy combinations were set.The optimal deception strategy was determined by equilibrium analysis of attack-defense model.Experimental results show that the proposed strategy can effectively improve system security.Besides, it can also reduce container migration frequency and defense cost.

Key words: cloud computing, container migration, honeypot, signal game

中图分类号: 

No Suggested Reading articles found!