Please wait a minute...
 首页  期刊列表 期刊订阅 开放获取 关于我们
English
最新录用  |  在线预览  |  当期目录  |  过刊浏览  |  学科浏览  |  专题文章  |  热点文章  |  下载排行
中国工程科学    2016, Vol. 18 Issue (6) : 69-73     https://doi.org/10.15302/J-SSCAE-2016.06.014
论文
拟态防御技术
罗兴国1, 仝青2, 张铮2, 邬江兴1
1.中国人民解放军信息工程大学国家数字交换系统工程技术研究中心, 郑州 450002;
2.中国人民解放军信息工程大学数学工程与先进计算国家重点实验室, 郑州 450001
Mimic Defense Technology
Luo Xingguo1, Tong Qing2, Zhang Zheng2, Wu Jiangxing1
1.National Digital Switching System Engineering & Technological R&D Center, PLA Information Engineering University, Zhengzhou 450002, China;
2.State Key Laboratory of Mathematical Engineering and Advanced Computing, PLA Information Engineering University, Zhengzhou 450001, China
全文: PDF(186 KB)  
导出: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
摘要 网络空间安全处于易攻难守的非平衡态势,主动防御技术作为网络空间防御技术的新星,其研究热度不断提高。本文以入侵容忍技术和移动目标防御技术为主线概括了主动防御技术的发展,并介绍了拟态防御技术理论、工程实践以及测试情况。通过分析对比拟态防御和入侵容忍、移动目标的异同,提出网络安全再平衡战略的研究重点和方向,为国家网络空间安全发展提供借鉴和参考。
关键词 拟态防御主动防御技术网络安全再平衡    
Abstract:Cyberspace security is in an unbalanced state, in which it is easy to attack and difficult to defend. Active defense technology is a new direction in cyberspace security research, which is attracting increasing attention. This paper summarizes the development of active defense via the introduction of intrusion-tolerant technology and moving target defense technology. Furthermore, the theory, implementation, and testing of mimic defense are introduced. Based on a comparison of mimic defense with intrusion tolerance and moving target defense, the research direction and the key points of cybersecurity rebalancing strategy are proposed to provide a reference for the development of national cybersecurity.
Keywords mimic defense      active defense technology      cybersecurity rebalance     
基金资助:中国工程院重大咨询项目“网络空间安全战略研究”(2015-ZD-10)
发布日期: 2016-12-22
服务
推荐给朋友
免费邮件订阅
RSS订阅
作者相关文章
引用本文:   
Luo Xingguo, Tong Qing, Zhang Zheng, Wu Jiangxing. Mimic Defense Technology[J]. Strategic Study of Chinese Academy of Engineering,2016, 18(6): 69-73.
网址:  
https://journal.hep.com.cn/sscae/EN/10.15302/J-SSCAE-2016.06.014     OR     https://journal.hep.com.cn/sscae/EN/Y2016/V18/I6/69
[1] Pang Jianmin, Zhang Yujia, Zhang Zheng, Wu Jiangxing. Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry[J]. Strategic Study of Chinese Academy of Engineering, 2016, 18(6): 74-78.
[2] Si Xueming, Wang Wei, Zeng Junjie, Yang Benchao, Li Guangsong, Yuan Chao, Zhang Fan. A Review of the Basic Theory of Mimic Defense[J]. Strategic Study of Chinese Academy of Engineering, 2016, 18(6): 62-68.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
版权所有 © 2015 高等教育出版社.
电话: 010-58556848 (技术); 010-58556485 (订阅) E-mail: subscribe@hep.com.cn