基于攻击面的不同冗余架构信息系统异构性研究

Liqun Wang, Zheng Zhang, Weichao Li, Guangwei Xie
{"title":"基于攻击面的不同冗余架构信息系统异构性研究","authors":"Liqun Wang, Zheng Zhang, Weichao Li, Guangwei Xie","doi":"10.1109/IMCCC.2018.00196","DOIUrl":null,"url":null,"abstract":"Cyber defenses based on heterogeneous redundant techniques have been proposed as a way to make systems more resistant to attacks. These defense approaches depend on the heterogeneous resources within the system in order to make attacks more complicated. However, little work has been done on evaluating or measuring heterogeneity among systems. In this work, we first build the attack surface model of information system with dissimilar redundant architecture. The attack surface model helps us identify the special system resources applied to the attack instances on a tested. Based on the analysis results, we get the attack surface resources of instance object. For the sake of increasing the system security, we construct the more heterogeneous executive entities by the attack surface resources. When we evaluate the heterogeneity among them, we conclude that the attack surface model administers to improve system security and its security increases as the heterogeneity of its executive entities becomes larger.","PeriodicalId":328754,"journal":{"name":"2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)","volume":"328 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Research on Heterogeneity of Information System with Dissimilar Redundant Architecture Based on Attack Surface\",\"authors\":\"Liqun Wang, Zheng Zhang, Weichao Li, Guangwei Xie\",\"doi\":\"10.1109/IMCCC.2018.00196\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber defenses based on heterogeneous redundant techniques have been proposed as a way to make systems more resistant to attacks. These defense approaches depend on the heterogeneous resources within the system in order to make attacks more complicated. However, little work has been done on evaluating or measuring heterogeneity among systems. In this work, we first build the attack surface model of information system with dissimilar redundant architecture. The attack surface model helps us identify the special system resources applied to the attack instances on a tested. Based on the analysis results, we get the attack surface resources of instance object. For the sake of increasing the system security, we construct the more heterogeneous executive entities by the attack surface resources. When we evaluate the heterogeneity among them, we conclude that the attack surface model administers to improve system security and its security increases as the heterogeneity of its executive entities becomes larger.\",\"PeriodicalId\":328754,\"journal\":{\"name\":\"2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)\",\"volume\":\"328 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMCCC.2018.00196\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Eighth International Conference on Instrumentation & Measurement, Computer, Communication and Control (IMCCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMCCC.2018.00196","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

基于异构冗余技术的网络防御已被提出作为一种使系统更能抵抗攻击的方法。这些防御方法依赖于系统内的异构资源,从而使攻击变得更加复杂。然而,在评估或测量系统之间的异质性方面所做的工作很少。本文首先建立了具有不同冗余结构的信息系统的攻击面模型。攻击面模型帮助我们识别应用于被测试攻击实例的特殊系统资源。根据分析结果,得到了实例对象的攻击面资源。为了提高系统的安全性,我们利用攻击面资源构造了异构程度更高的执行实体。当我们评估它们之间的异构性时,我们得出结论,攻击面模型管理可以提高系统的安全性,并且随着其执行实体的异构性变得更大,其安全性也会增加。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Research on Heterogeneity of Information System with Dissimilar Redundant Architecture Based on Attack Surface
Cyber defenses based on heterogeneous redundant techniques have been proposed as a way to make systems more resistant to attacks. These defense approaches depend on the heterogeneous resources within the system in order to make attacks more complicated. However, little work has been done on evaluating or measuring heterogeneity among systems. In this work, we first build the attack surface model of information system with dissimilar redundant architecture. The attack surface model helps us identify the special system resources applied to the attack instances on a tested. Based on the analysis results, we get the attack surface resources of instance object. For the sake of increasing the system security, we construct the more heterogeneous executive entities by the attack surface resources. When we evaluate the heterogeneity among them, we conclude that the attack surface model administers to improve system security and its security increases as the heterogeneity of its executive entities becomes larger.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Survey of Flying Ad-Hoc Networks: Characteristics and Challenges Survey of Matrix Completion Models A Weibo APP Design Based on Eclipse and Android Platforms A Study on the Optimization of Emergency Transfer of Casualties in Large-Scale Disasters Detecting Masqueraders by Profiling User Behaviors
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1