移动目标防御系统安全评估方法的研究进展
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research Progress of Security Assessment Methods for Moving Target Defense Systems
  • 作者:张莹 ; 张保稳
  • 英文作者:ZHANG Ying;ZHANG Bao-wen;Shanghai Jiao Tong University School of Cyber Security;Shanghai Key Laboratory of Integrated Administration Technologies for Information Security;
  • 关键词:移动攻击面 ; 移动目标防御 ; 网络空间安全 ; 安全评估
  • 英文关键词:moving attack surface;;moving target defense;;cyberspace security;;security assessment
  • 中文刊名:TXJS
  • 英文刊名:Communications Technology
  • 机构:上海交通大学网络空间安全学院;上海市信息安全综合管理技术研究重点实验室;
  • 出版日期:2018-01-10
  • 出版单位:通信技术
  • 年:2018
  • 期:v.51;No.313
  • 基金:科技部国家重点研发计划(No.2016YFB0800100,No.2016YFB0800105);; 国家自然科学地区科学基金项目(No.61562004)~~
  • 语种:中文;
  • 页:TXJS201801001
  • 页数:6
  • CN:01
  • ISSN:51-1167/TN
  • 分类号:7-12
摘要
目前,常规的信息系统主要实施静态、被动的网络空间安全防御,处于易攻难守的不利局面。移动目标防御(Moving Target Defense,MTD)作为一种动态、主动的防御技术,改变了传统网络安全防御的方式,其核心思想是防御者要不断改变系统的攻击面,以增加攻击者实施攻击的难度。简要介绍MTD常见实施原理,结合主流安全评估技术分析MTD安全评估问题及其难点,特别是在安全建模、安全目标和安全评估方法等方面,指出了其所面临的新的难题和挑战,重点就安全建模和评估方法方面论述并总结了现有MTD安全评估研究进展。最后,指出了MTD安全评估技术未来的重点研究方向。
        At present, the conventional information system mainly implements static and passive cyberspace security defense, and thus is in an unfavorable situation of easy to attack and hard to keep. As a dynamic and active defense technology, mobile target defense changes the way of traditional network security defense. The core idea is that the defender should constantly change the attack surface of the system so as to increase the attacker's difficulty in carrying out the attack. The common implementation principles of MTD are briefly introduced, and the problems and difficulties of MTD security assessment are analyzed in combination with the mainstream security assessment technology. And the new problems and challenges are pointed out particularly in the aspects of security modeling, safety goals and safety assessment methods. Meanwhile the research progress of existing MTD security assessment is discussed and summarized from the aspects of security modeling and evaluation methods. Finally, the key research direction of MTD security assessment technology is given.
引文
[1]徐玮晟,张保稳,李生红.网络安全评估方法研究进展[J].信息安全与通信保密,2009(10):50-53.XU Wei-sheng,ZHANG Bao-wen,LI Sheng-hong.Research Progress on Methods of Network Security Assessment[J].Information Security and Communications Security,2009(10):50-53.
    [2]Jangda A,Mishra M,Sutter B D.Adaptive Just-In-Time Code Diversification[C].ACM Workshop on Moving Target Defense,2015:49-53.
    [3]Manadhata P K,Wing J M.An Attack Surface Metric[J].IEEE Transactions on Software Engineeri-ng,2011,37(03):371-386.
    [4]Al-Shaer E.A Cyber Mutation:Metrics,Techniques and Future Directions[C].ACM Workshop on Moving Target Defense,2016:1.
    [5]杨林,于全.动态赋能网络空间防御[M].北京:人民邮电出版社,2016.YANG Lin,YU Quan.Dynamically-enabled Cyber Defense[M].Beijing:Posts&Telecom Press,2016.
    [6]Moody W C,Hu H,Apon A.Defensive Maneuver Cyber Platform Modeling with Stochastic Petri Nets[C].IEEE International Conference on Collaborative Computing:Networking,Applications and Worksharing,2014:531-538.
    [7]Anderson N,Mitchell R,Chen I R.Parameterizing Moving Target Defenses[C].International Conference on New Technologies,Mobility and Security,2016:1-6.
    [8]Zhuang R,Deloach S A,Ou X.A Model for Analyzing the Effect of Moving Target Defenses on Enterprise Networks[C].Cyber and Information Security Research Conference ACM,2014:73-76.
    [9]Carroll T E,Crouse M,Fulp E W,et al.Analysis of Network Address Shuffling as a Moving Target Defense[C].IEEE International Conference on Communications,2014:701-706.
    [10]雷程,马多贺,张红旗等.基于变点检测的网络移动目标防御效能评估方法[J].通信学报,2017,38(01):126-140.LEI Cheng,MA Duo-he,ZHANG Hong-qi,et al.Performance Assessment Approach based on Change-point Detection for Network Moving Target Defense[J].Journal on Communications,2017,38(01):126-140.
    [11]HAN Yu-juan,LU Wen-lian,XU Shou-huai.Characterizing the Power of Moving Target Defense via Cyber Epidemic Dynamics[C].Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,2014:23-33.
    [12]Xu J,Guo P,Zhao M,et al.Comparing Different Moving Target Defense Techniques[C].ACM Workshop on Moving Target Defense,2014:97-107.
    [13]Hamlet J R,Lamb C C.Dependency Graph Analysis and Moving Target Defense Selection[C].ACM Workshop on Moving Target Defense,2016:105-116.
    [14]Zhuang R,Zhang S,Deloach S A,et al.Simulation-based Approaches to Studying Effectiveness of Moving-Target Network Defense[C].National Symposium on Moving Target Research,2013:15111-15126.
    [15]Eskridge T C,Carvalho M M,Stoner E,et al.VINE:A Cyber Emulation Environment for MTD Experimentation[C].ACM Workshop on Moving Target Defense,2015:43-47.
    [16]Zaffarano K,Taylor J,Hamilton S.A Quantitative Framework for Moving Target Defense Effectiveness Evaluation[C].ACM Workshop,2015:3-10.
    [17]Okhravi H,Riordan J,Carter K.Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism[C].International Workshop on Recent Advances in Intrusion Detection,2014:405-425.
    [18]Clark A,Sun K,Poovendran R.Effectiveness of IP Address Randomization in Decoy-based Moving Target Defense[C].Decision and Control IEEE,2013:678-685.
    [19]Hong J B,Dong S K.Assessing the Effectiveness of Moving Target Defenses Using Security Models[J].IEEE Transactions on Dependable&Secure Computing,2016,13(02):163-177.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700