通信学报 ›› 2021, Vol. 42 ›› Issue (3): 122-134.doi: 10.11959/j.issn.1000-436x.2021022

• 学术论文 • 上一篇    下一篇

基于执行体划分的防御增强型动态异构冗余架构

吴铤1,2, 胡程楠1, 陈庆南1, 陈安邦1, 郑秋华1   

  1. 1 杭州电子科技大学网络空间安全学院,浙江 杭州 310018
    2 北京航空航天大学杭州创新研究院,浙江 杭州 310051
  • 修回日期:2020-12-30 出版日期:2021-03-25 发布日期:2021-03-01
  • 作者简介:吴铤(1972- ),男,浙江杭州人,博士,杭州电子科技大学教授、博士生导师,主要研究方向为拟态安全、理论密码学、工控安全。
    胡程楠(1996- ),男,浙江杭州人,杭州电子科技大学硕士生,主要研究方向为拟态安全、工控安全。
    陈庆南(1994- ),男,浙江宁波人,杭州电子科技大学硕士生,主要研究方向为拟态安全、工控安全。
    陈安邦(1996- ),男,河南信阳人,杭州电子科技大学硕士生,主要研究方向为拟态安全、工控安全。
    郑秋华(1973- ),男,浙江杭州人,博士,杭州电子科技大学讲师,主要研究方向为拟态安全理论分析、拟态Web服务攻防技术、工控安全。
  • 基金资助:
    浙江省重点研发计划基金资助项目(2020C01078);浙江省重点研发计划基金资助项目(2019C01012);浙江省重点研发计划基金资助项目(2017C01062)

Defense-enhanced dynamic heterogeneous redundancy architecture based on executor partition

Ting WU1,2, Chengnan HU1, Qingnan CHEN1, Anbang CHEN1, Qiuhua ZHENG1   

  1. 1 School of Cyberspace Security, Hangzhou Dianzi University, Hangzhou 310018, China
    2 Hangzhou Innovation Institute, Beihang University, Hangzhou 310051, China
  • Revised:2020-12-30 Online:2021-03-25 Published:2021-03-01
  • Supported by:
    Zhejiang Province Key Research and Development Program(2020C01078);Zhejiang Province Key Research and Development Program(2019C01012);Zhejiang Province Key Research and Development Program(2017C01062)

摘要:

针对DHR系统服务体在面临共同漏洞时的系统脆弱性问题,提出了一种改进的DHR架构——IDHR。该架构在 DHR 的基础上,首先引入根据执行体间的异构性对执行体集进行划分的执行体划分模块,以极大增强各执行体池之间的异构性。在此基础上,改进调度模块中的动态选择算法,即采用先随机选择执行体池,再从执行体池中随机选择执行体的方式,以提高在共同漏洞下 DHR 系统的安全性。最后,通过随机模拟执行体和仿真Web服务器2种实验方案,从攻击成功率和被控制率2个方面对所提IDHR架构进行安全性评估。实验结果表明, IDHR架构的安全性,尤其是在共同漏洞未知情况下,明显优于传统DHR架构。

关键词: 拟态防御, 拟态系统架构, 动态异构冗余, 安全性分析

Abstract:

Aiming at the security problem when servants are faced with common vulnerabilities, an improved DHR architecture called IDHR was proposed.On the basis of DHR, an executor-partition module that divided the executor-set to several executor pools by the heterogeneity among the executors was introduced to improve the heterogeneity among the executor pools.Moreover, the scheduling algorithm was improved by choosing executor pools randomly at first, and then choosing the executors from these pools randomly.Finally, through two experimental schemes of random simulation and Web server emulation, the security evaluation of the proposed IDHR architecture was carried out from two aspects of attack success rate and control rate.Experimental results show that the security of the IDHR architecture, especially when the common vulnerability is unknown, is significantly better than the traditional DHR architecture.

Key words: mimic defense, mimic system architecture, dynamic heterogeneous redundancy, security analysis

中图分类号: 

No Suggested Reading articles found!