电信科学 ›› 2020, Vol. 36 ›› Issue (5): 31-38.doi: 10.11959/j.issn.1000-0801.2020143

• 专题:网络安全的智能化和高对抗性发展 • 上一篇    下一篇

基于异构冗余架构的拟态防御建模技术

秦俊宁1,韩嘉佳2,周升3,吴春明4,陈双喜4,5(),赵若琰4,张江瑜4   

  1. 1 浙江华云信息科技有限公司,浙江 杭州310027
    2 国网浙江省电力有限公司电力科学研究院,浙江 杭州310027
    3 国网浙江省电力有限公司,浙江 杭州310027
    4 浙江大学,浙江 杭州310058
    5 嘉兴职业技术学院,浙江 嘉兴314036
  • 修回日期:2020-04-25 出版日期:2020-05-20 发布日期:2020-05-18
  • 作者简介:秦俊宁(1972- ),男,浙江华云信息科技有限公司高级工程师,主要研究方向为信息安全管理|韩嘉佳(1983- ),女,国网浙江省电力有限公司电力科学研究院高级工程师,主要研究方向为网络安全|周升(1985- ),男,国网浙江省电力有限公司高级工程师,主要研究方向为网络安全|吴春明(1967- ),男,浙江大学教授、博士生导师,主要研究方向为人工智能、柔性可重构网络体系、软件定义网络、网络主动防御创新安全技术等|陈双喜(1980- ),男,嘉兴职业技术学院讲师,浙江大学博士生,主要研究方向为网络空间安全的渗透与主动防御|赵若琰(1998- ),女,浙江大学硕士生,主要研究方向为云安全、拟态防御|张江瑜(1998- ),男,浙江大学硕士生,主要研究方向为新型主动防御
  • 基金资助:
    国家电网总部科技项目(52110118001F)

Modeling of the mimic defense based on heterogeneous redundancy

Junning QIN1,Jiajia HAN2,Sheng ZHOU3,Chunming WU4,Shuangxi CHEN4,5(),Ruoyan ZHAO4,Jiangyu ZHANG4   

  1. 1 Zhejiang Huayun Info Technology Co.,Ltd.,Hangzhou 310027,China
    2 State Grid Zhejiang Electric Power Co.,Ltd.Research Institute,Hangzhou 310027,China
    3 State Grid Zhejiang Electric Power Co.,Ltd.,Hangzhou 310027,China
    4 Zhejiang University,Hangzhou 310058,China
    5 Jiaxing Vocational and Technical College,Jiaxing 314036,China
  • Revised:2020-04-25 Online:2020-05-20 Published:2020-05-18
  • Supported by:
    The Science and Technology Funding Project of State Grid(52110118001F)

摘要:

介绍了网络安全发展的不平衡现状,对渗透测试的主要危害和机理模型进行描述,分析并发现了现存的多种传统防御手段均存在其固有缺点;而拟态防御模型的新方法可以通过动态选择执行体集,适应性地改变系统组成,使得攻击者获得的攻击信息失效,相同攻击难以维持或再现,基于攻击链模型对传统防御技术和拟态防御技术进行了分析和对比,论证了拟态防御在攻击链的多个阶段均具有防护作用;最后,通过实验验证了拟态防御的有效性和优越性,并对该模型进行了总结和展望。

关键词: 传统防御, 非平衡态势, 渗透测试, 异构冗余, 拟态防御

Abstract:

The unbalanced development status of network security was introduced.The main hazards and the mechanism model of penetration testing were described,and the inherent shortcomings of many existing traditional defense methods were analyzed.However,new method of the mimic defense model makes the attack information obtained invalid by dynamically selecting the executive set and adaptively changing the system composition.The same attack mode is difficult to be maintained or reproduced.Based on the attack chain model,the traditional defensetechnology and mimic defense technology were analyzed and compared,and it was demonstrated that it had a protective role in multiple stages of the attack chain.Finally,the effectiveness and superiority of the mimic defense was verified by experiments,and the model was summarized and prospected.

Key words: traditional defense, unbalanced situation, penetration test, heterogeneous redundancy, mimic defense

中图分类号: 

No Suggested Reading articles found!