首页 | 本学科首页   官方微博 | 高级检索  
     

基于物联网集成防御机制的诱饵路径优化算法
引用本文:张琳,李焕洲,张健,唐彰国.基于物联网集成防御机制的诱饵路径优化算法[J].计算机应用研究,2021,38(11):3433-3438.
作者姓名:张琳  李焕洲  张健  唐彰国
作者单位:四川师范大学网络与通信技术研究所,成都610101
基金项目:国家自然科学基金资助项目(U1836103);四川省科技计划资助项目(2018GFW0063)
摘    要:针对物联网设备很容易被攻击者利用来入侵网络的问题,设计实现了一种将基于网络拓扑改组的移动目标防御(network topology shuffling-based moving target defense,NTS-MTD)和网络欺骗相结合的物联网集成防御机制,并基于该防御机制设计了一种诱饵路径优化算法(decoy path-based optimization algorithm,DPOA)来进行网络拓扑改组优化.在软件定义网络(software defined network,SDN)的支持下主动改变真实节点和诱饵节点的网络拓扑,实现物联网环境中的网络拓扑改组.通过一个带有安全度量的图形安全模型(graphical security model,GSM)研究防御机制有效性,并使用三个指标对DPOA的安全性和性能进行衡量.仿真结果表明,基于DPOA的方案防御成本显著降低且安全性高,更适应于物联网.

关 键 词:移动目标防御  网络欺骗  物联网  图形安全模型
收稿时间:2021/4/14 0:00:00
修稿时间:2021/10/12 0:00:00

Decoy path optimization algorithm based on integrated defense mechanism of Internet of Things
Zhang Lin,Li Huanzhou,Zhang Jian and Tang Zhangguo.Decoy path optimization algorithm based on integrated defense mechanism of Internet of Things[J].Application Research of Computers,2021,38(11):3433-3438.
Authors:Zhang Lin  Li Huanzhou  Zhang Jian and Tang Zhangguo
Affiliation:Institute of Computer Network and Communication Technology,Sichuan Normal University,,,
Abstract:Aiming at the problem that Internet of Things devices are easy to be used by attackers to invade the network, this paper designed and implemented an integrated defense mechanism of Internet of Things, which combined network topology shuffling-based moving target defense(NTS-MTD) and cyber deception. And based on this defense mechanism, this paper designed a decoy path-based optimization algorithm(DPOA) to optimize the network topology. With the support of software defined network(SDN), changing the network topology of real nodes and decoy nodes actively to realize the network topology shuffling in the Internet of Things. This paper studied the effectiveness of defense mechanism through a graphical security model(GSM) with security metrics, and used three indicators to measure the security and performance of DPOA. The simulation results show that the defense cost of the scheme based on DPOA is significantly reduced and the security is high, which is more suitable for the Internet of Things.
Keywords:moving target defense(MTD)  cyber deception  Internet of Things(IoT)  graph security model(GSM)
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机应用研究》浏览原始摘要信息
点击此处可从《计算机应用研究》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号