网络与信息安全学报 ›› 2022, Vol. 8 ›› Issue (5): 121-128.doi: 10.11959/j.issn.2096-109x.2022059

• 学术论文 • 上一篇    下一篇

面向进程多变体软件系统的攻击面定性建模分析

邢福康1, 张铮1, 隋然2, 曲晟1, 季新生1   

  1. 1 信息工程大学,河南 郑州 450001
    2 中央军委后勤保障部信息中心,北京 100089
  • 修回日期:2022-04-25 出版日期:2022-10-15 发布日期:2022-10-01
  • 作者简介:邢福康(1997- ),男,山东聊城人,信息工程大学博士生,主要研究方向为网络空间安全、Web应用安全
    张铮(1976- ),男,湖北黄冈人,博士,信息工程大学副教授,主要研究方向为网络空间安全、主动防御技术
    隋然(1974- ),男,山东青岛人,博士,中央军委后勤保障部信息中心研究员,主要研究方向为网络空间安全
    曲晟(1996- ),男,山西忻州人,信息工程大学博士生,主要研究方向为网络空间安全、主动防御技术
    季新生(1968- ),男,河南驻马店人,博士,信息工程大学教授、博士生导师,主要研究方向为网络空间安全、无线通信
  • 基金资助:
    国家自然科学基金(61521003);国家重点研发计划(2018YF0804003);国家重点研发计划(2017YFB0803204)

Qualitative modeling and analysis of attack surface for process multi-variant execution software system

Fukang XING1, Zheng ZHANG1, Ran SUI2, Sheng QU1, Xinsheng JI1   

  1. 1 Information Engineering University, Zhengzhou 450001, China
    2 Information Center of Logistics Support Department of Central Military Commission, Beijing 100089, China
  • Revised:2022-04-25 Online:2022-10-15 Published:2022-10-01
  • Supported by:
    The National Natural Science Foundation of China(61521003);The National Key R&D Program of China(2018YF0804003);The National Key R&D Program of China(2017YFB0803204)

摘要:

攻击面是衡量软件系统安全性的一个重要指标,采用攻击面描述可以通过集合的方式描述软件系统的安全性并对其进行度量。一般的攻击面模型基于I/O自动机模型对软件系统进行建模,其一般采用非冗余的架构,难以应用于类似多变体系统这类异构冗余的系统架构。Manadhatad等提出了一种在非相似余度系统中进行攻击面度量的方式,但其采用的系统架构表决粒度和表决方式与多变体系统不同,无法准确度量多变体系统的攻击面。因此,在传统攻击面模型基础上,结合多变体系统异构冗余架构的特点,对传统攻击面模型进行扩展,并构建多变体系统的攻击面模型;使用形式化方式表示多变体系统的攻击面,根据多变体系统在系统出口点处的表决机制对传统攻击面模型进行改进,以使其能解释多变体系统攻击面缩小的现象,通过该建模方式,能够说明采用多变体架构的多变体系统在运行过程中攻击面的变化。采用了两组多变体执行架构的软件系统进行实例分析,分别通过与未采用多变体架构的功能相同的软件系统在未受攻击和遭受攻击两种情境下进行攻击面的对比分析,体现多变体系统在攻击面上的变化。结合攻击面理论与多变体执行系统的特点提出了一种面向多变体执行系统的攻击面建模方法,目前可以定性分析多变体执行系统攻击面的变化,未来将在定量分析多变体执行系统攻击面的方向继续进行深入研究。

关键词: 多变体, 攻击面, 攻击面度量, 网络安全

Abstract:

Attack surface is an important index to measure security of software system.The general attack surface model is based on the I/O automata model to model the software system, which generally uses a non-redundant architecture and it is difficult to apply to heterogeneous redundant system architectures such as multi variant systems.Manadhatad et al.proposed a method to measure the attack surface in a dissimilar redundancy system.However, the voting granularity and voting method of the system architecture adopted by Manadhatad are different from those of the multi-variant system, which cannot accurately measure the attack surface of the multi variant system.Therefore, based on the traditional attack surface model, combined with the characteristics of heterogeneous redundant architecture of multi variant systems, the traditional attack surface model was extended and the attack surface model of multivariant systems was constructed.The attack surface of the multi variant system was represented in a formal way, and the traditional attack surface model was improved according to the voting mechanism of the multi variant system at the exit point of the system, so that it can explain the phenomenon that the attack surface of the multi variant system shrinks.Through this modeling method, the change of the attack surface of the multi variant system adopting the multi variant architecture can be explained in the running process.Then, two groups of software systems with multi variant execution architecture were used as analyzing examples.The attack surface of the software systems with the same functions as those without multi variant architecture were compared and analyzed in two situations of being attacked and not being attacked, reflecting the changes of the multi variant system in the attack surface.Combining the attack surface theory and the characteristics of the multi variant execution system, an attack surface modeling method for the multi variant execution system was proposed.At present, the changes of the attack surface of the multi variant execution system can be qualitatively analyzed.In-depth research in the quantitative analysis of the attack surface of the multi variant execution system will be continually conducted.

Key words: multi-variant execution, attack surface, attack surface metric, network security

中图分类号: 

No Suggested Reading articles found!