网络与信息安全学报 ›› 2022, Vol. 8 ›› Issue (2): 15-38.doi: 10.11959/j.issn.2096-109x.2022018

• 专栏:网络攻击与防御技术 • 上一篇    下一篇

网络空间拟态防御发展综述:从拟态概念到“拟态+”生态

马海龙1, 王亮1,2, 胡涛1, 江逸茗1, 曲彦泽1   

  1. 1 信息工程大学信息技术研究所,河南 郑州 450003
    2 66135部队,北京 100043
  • 修回日期:2022-03-01 出版日期:2022-04-15 发布日期:2022-04-01
  • 作者简介:马海龙(1980− ),男,山东沂水人,信息工程大学副研究员,主要研究方向为网络空间内生安全、网络威胁智能感知及新型网络体系
    王亮(1995− ),男,河南唐河人,信息工程大学助理工程师,主要研究方向为网络主动防御
    胡涛(1993− ),男,陕西武功人,信息工程大学助理研究员,主要研究方向为新型网络体系结构,网络主动防御
    江逸茗(1984− ),男,江苏南通人,信息工程大学副研究员,主要研究方向为网络安全、新型网络体系研究
    曲彦泽(1998− ),山东烟台人,信息工程大学硕士生,主要研究方向为网络威胁感知
  • 基金资助:
    国家重点研发计划(2020YFB1804803)

Survey on the development of mimic defense in cyberspace:from mimic concept to “mimic+” ecology

Hailong MA1, Liang WANG1,2, Tao HU1, Yiming JIANG1, Yanze QU1   

  1. 1 Information Technology Research Institute, Information Engineering University, Zhengzhou 450003, China
    2 Unit 66135, Beijing 100043, China
  • Revised:2022-03-01 Online:2022-04-15 Published:2022-04-01
  • Supported by:
    The National Key R&D Program of China(2020YFB1804803)

摘要:

网络空间拟态防御(CMD,cyberspace mimic defense)基于动态异构冗余架构实现多体执行、多模裁决和多维重构,以不确定性系统应对网络空间泛在化的不确定性威胁。从纵向、横向、当前、发展和未来5个视角对其8年来的演进进行系统综述:纵向观,概述了CMD从概念提出,到理论、实践层面形成发展的历程;横向观,阐述了CMD的DHR(dynamical heterogeneous redundancy)核心架构、以CMD三定理为支柱的原理、安全增益、性能开销,将其与入侵容忍、移动目标防御、零信任架构、可信计算和计算机免疫学 5 类其他主动防御技术进行了综合对比辨析;当前观,综述了拟态路由器、拟态处理机、拟态 DNS服务器、拟态云平台等 11 类现有主要拟态产品的实现要素、性能表现、系统架构、异构策略、调度策略、表决策略等共性技术模式与特性技术特点;发展观,结合人工智能、物联网、云计算、大数据和软件定义网络5类新型技术探讨了“拟态+”AICDS(拟态+AI/ IoT/Cloud/Data/SDN)共生生态,提出了相应技术结合点和交叉研究价值;未来观,展望了未来拟态基线 2.0 产品生态、“拟态+5G/6G”“拟态+边缘计算”“拟态+云”和“拟态+区块链”5 类“拟态+”应用场景,分析归纳了拟态防御技术面临的存在多模决策攻击逃逸空间、异构与同步互制约、安全与功能难平衡和现有内生安全组件变换空间有限4点挑战。

关键词: 网络空间拟态防御, 系统架构, 异构策略, 调度策略, 非协同多模决策, 异构度增益

Abstract:

Build upon the dynamic-heterogeneous-redundant architecture for multi-body execution, multi-mode ruling and multi-dimension reconstruction, cyberspace mimic defense (CMD) uses uncertain system to deal with the uncertain threat to cyberspace ubiquity.The evolution of CMD over the past 8 years were reviewed systematically from the vertical, horizontal, current, developing and future perspectives.From the vertical perspective, the development process of CMD from concept to theory and practice was summarized.From the horizontal view, it elaborated the core structure DHR (dynamical heterogeneous redundancy) of CMD, the principles based on CMD’s three major theorems, safety gains and performance costs.A comparison was conducted between CMD and five other active defense technologies, namely intrusion tolerance, moving target defense, zero trust architecture, trusted computing and computer immunology.From the current perspective, it reviewed the implementation elements, performance, system architecture, heterogeneous strategies, scheduling strategies, voting strategies and other common technology patterns and characteristics of 11 types of main existing mimic products including mimicry router, mimicry processor, mimicry DNS server and mimicry cloud platform.From the developing perspective, it explored the “mimic+” AICDS (Mimic + AI/IoT/Cloud/Data/SDN) symbiotic ecology with respect to 5 types of new technologies, namely artificial intelligence, Internet of things, cloud computing, big data and software-defined network, and proposed the corresponding technology junctions and cross research value.From the future perspective, it looked into the future mimicry baseline 2.0 product ecology, “mimic +5G/6G”, “mimic + edge computing”,“mimic + cloud” and “mimic + blockchain” application scenarios.Besides, 4 types of challenges faced by CMD in the future were analyzed and summarized, including escape space of multi-mode decision attack, mutual restriction of heterogeneous and synchronous, difficult balance between security and function, and limited transformation space of existing endogenous security components.

Key words: cyberspace mimic defense, system architecture, heterogeneous strategy, scheduling strategy, non-cooperative multi-mode decision-making, heterogeneous gain

中图分类号: 

No Suggested Reading articles found!