首页 | 本学科首页   官方微博 | 高级检索  
     

异构冗余系统的安全性分析
引用本文:王伟,杨本朝,李光松,斯雪明. 异构冗余系统的安全性分析[J]. 计算机科学, 2018, 45(9): 183-186, 194
作者姓名:王伟  杨本朝  李光松  斯雪明
作者单位:信息工程大学数学工程与先进计算国家重点实验室 郑州450001,信息工程大学数学工程与先进计算国家重点实验室 郑州450001,信息工程大学数学工程与先进计算国家重点实验室 郑州450001,信息工程大学数学工程与先进计算国家重点实验室 郑州450001
基金项目:本文受国家重点研发计划(2016YFB0800101),国家自然科学基金(61602512)资助
摘    要:随着互联网技术的发展和普及,漏洞和后门已经成为导致网络安全问题的主要因素。冗余技术可以很好地解决系统的可靠性问题。受拟态防御思想的启发,分析了异构冗余技术对基于漏洞和后门的网络攻击进行安全防御的有效性。在一些假设前提下,以系统攻击成功率表征系统的安全性,建立了基于马尔科夫过程的异构冗余系统的安全性评估数学模型,给出了系统攻击成功率的表达式。最后对3模异构冗余系统进行了求解和分析,计算结果与直观预期相符。

关 键 词:拟态防御  异构冗余  漏洞后门  马尔科夫
收稿时间:2017-08-01
修稿时间:2017-11-17

Security Analysis of Heterogeneous Redundant Systems
Affiliation:State Key Laboratory of Mathematical Engineering and Advanced Computing,Information Engineering University,Zhengzhou 450001,China,State Key Laboratory of Mathematical Engineering and Advanced Computing,Information Engineering University,Zhengzhou 450001,China,State Key Laboratory of Mathematical Engineering and Advanced Computing,Information Engineering University,Zhengzhou 450001,China and State Key Laboratory of Mathematical Engineering and Advanced Computing,Information Engineering University,Zhengzhou 450001,China
Abstract:With the development and popularization of Internet technology,vulnerability and backdoor problems have become the main factor of network security problems.The redundancy technology can solve the reliability problem of system.Inspired by the idea of the mimicry defense,this paper analyzed the effectiveness of the heterogeneous redundant technology against the security defense based on the vulnerability and backdoor network attack.On some assumptions, this paper established a security model of heterogeneous redundant system based on Markov process. System security was characterized by the success rate of system attack,and the expression of success rate of system attack was given.At last,triple-redundant heterogeneous system was solved and analyed.The experimental results are in accordance with the intuitive expectations.
Keywords:Mimic defense  Heterogeneous redundancy  Vulnerability backdoor  Markov
点击此处可从《计算机科学》浏览原始摘要信息
点击此处可从《计算机科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号