计算机科学 ›› 2019, Vol. 46 ›› Issue (11A): 438-441.

• 信息安全 • 上一篇    下一篇

基于拟态防御的管理信息系统

常啸林1,2, 樊永文1, 朱维军1, 刘洋1   

  1. (郑州大学信息工程学院 郑州450001)1;
    (河南大学软件学院 河南 开封475000)2
  • 出版日期:2019-11-10 发布日期:2019-11-20
  • 通讯作者: 朱维军(1976-),男,博士后,副教授,CCF高级会员,主要研究方向为信息安全,E-mail:zhuweijun76@163.com。
  • 作者简介:常啸林(1998-),男,主要研究方向为网络安全。
  • 基金资助:
    本文受国家自然科学基金项目(U1204608),国家重点研发计划项目(2016YFB0800100)资助。

Management Information System Based on Mimic Defense

CHANG Xiao-lin1,2, FAN Yong-wen1, ZHU Wei-jun1, LIU Yang1   

  1. (School of Information Engineering,Zhengzhou University,Zhengzhou 450001,China)1;
    (School of software,Henan University,Kaifeng,Henan 475000,China)2
  • Online:2019-11-10 Published:2019-11-20

摘要: 管理信息系统(Management Information Systems,MIS)的安全性关系着众多企业和组织的正常运作。针对现有信息管理系统安全防护方法的不足,文中提出了一种基于拟态防御的管理信息系统(Mimic Management Information Systems,MMIS)。首先,为表示层、业务逻辑层、数据服务层构建冗余执行体集;然后,利用动态配置器对执行体集进行动态调度;最后,利用表决器对执行体集进行表决处理。仿真实验结果表明,与传统MIS相比,MMIS具有更高的安全性。

关键词: 动态配置, 多样性, 管理信息系统, 拟态防御, 拟态管理信息系统

Abstract: Safety management information system(MIS) affects the normal operations of many enterprises and organizations.In view of the shortcomings of existing security protection methods for information management systems,this paper proposed a management information system based on Mimic Defense(Mimic Management Information Systems,MMIS).Firstly,redundant execution set is constructed for presentation layer,business logic layer and data servicela-yer.Secondly,execution set is dynamically scheduled by dynamic configurator.Finally,execution set is voted by voter.The simulation results show that MMIS has higher security than traditional MIS.

Key words: Diversity, Dynamic configuration, Management information system, Mimic defense, Mimic management information systems

中图分类号: 

  • TP315
[1]薛华成.管理信息系统(第六版) [M].北京:清华大学出版社,2012.
[2]张梦.基于C/S结构的中小企业人事管理系统的设计与开发[J].计算机科学,2016,43(S1):547-550.
[3]AROMS E.NIST Special Publication 800-94 Guide to Intrusion Detection and Prevention Systems(IDPS)[M].USA,CreateSpace,2012.
[4] ZHUANG R,QIAN D F,ZHANG W J.A Survey of Intrusion Detection Technology Research[J].Journal of Chinese Computer Systems,2003,24(7):1113-1118.
[5]WANG J,KISSEL Z A.Data Encryption Algorithms[M].John Wiley & Sons Singapore Pte.Ltd,2009.
[6]CLINCY V,SHAHRIAR H.2018 IEEE 42nd Annual Computer Software and Applications Conference(COMPSAC)- Web Application Firewall:Network Security Models and Configuration[C]∥IEEE Computer Software & Applications Conference.IEEE,2018:835-836.
[7]邬江兴.网络空间拟态防御导论[M].北京,科学出版社,2017.
[8]邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10.
[9]多国顶尖“白帽黑客”对拟态防御网络设备和系统发起50余万次攻击测试无一次得手[EB/OL].新华网.http://m.xinhuanet.com/2018-05/12/c_129870684.htm,2018.
[10]熊斌.基于B/S三层架构OA系统的设计和实现[D].电子科技大学,2011.
[11]仝青,张铮,邬江兴.基于软硬件多样性的主动防御技术[J].信息安全学报,2017,2(1):1-12.
[12]GARCIA M,BESSANI A N,GASHI I,et al.OS diversity for intrusion tolerance:Myth or reality[C]∥IEEE/IFIP International Conference on Dependable Systems & networks.IEEE Computer Society,2011.
[13]周余阳,程光,郭春生,等.移动目标防御的攻击面动态转移技术研究综述[J].软件学报,2018,29(9):2799-2820.
[14]仝青,张铮,张为华,等.拟态防御Web服务器设计与实现[J].软件学报,2017,28(4):883-897.
[15]王禛鹏,扈红超,程国振.一种基于拟态安全防御的DNS框架设计[J].电子学报,2017(11):2705-2714.
[16]CALLAHAN T,ALLMAN M,RABINOVICH M.On modern DNS behavior and properties[M].ACM,2013.
[17]魏帅,于洪,顾泽宇,等.面向工控领域的拟态安全处理机架构[J].信息安全学报,2017,2(1):54-73.
[18]扈红超,陈福才,王禛鹏.拟态防御DHR模型若干问题探讨和性能评估[J].信息安全学报,2016,1(4):40-51.
[19]吴文青,唐应辉,兰绍军.修理设备可更换的k/n(G)表决可修系统[J].数学学报(中文版),2016,59(6):799-820.
[20]柏仲干.复杂系统Bayes可靠性评估方法研究及其应用软件的研制[D].长沙:国防科学技术大学,2003.
[1] 王宇飞, 陈文.
基于DECORATE集成学习与置信度评估的Tri-training算法
Tri-training Algorithm Based on DECORATE Ensemble Learning and Credibility Assessment
计算机科学, 2022, 49(6): 127-133. https://doi.org/10.11896/jsjkx.211100043
[2] 陈壮, 邹海涛, 郑尚, 于化龙, 高尚.
基于用户覆盖及评分差异的多样性推荐算法
Diversity Recommendation Algorithm Based on User Coverage and Rating Differences
计算机科学, 2022, 49(5): 159-164. https://doi.org/10.11896/jsjkx.210300263
[3] 刘意, 毛莺池, 程杨堃, 高建, 王龙宝.
基于邻域一致性的异常检测序列集成方法
Locality and Consistency Based Sequential Ensemble Method for Outlier Detection
计算机科学, 2022, 49(1): 146-152. https://doi.org/10.11896/jsjkx.201000156
[4] 杨林, 王永杰, 张俊.
FAWA:一种异构执行体的负反馈动态调度算法
FAWA:A Negative Feedback Dynamic Scheduling Algorithm for Heterogeneous Executor
计算机科学, 2021, 48(8): 284-290. https://doi.org/10.11896/jsjkx.200900059
[5] 周钢, 郭福亮.
基于特征选择的高维数据集成学习方法研究
Research on Ensemble Learning Method Based on Feature Selection for High-dimensional Data
计算机科学, 2021, 48(6A): 250-254. https://doi.org/10.11896/jsjkx.200700102
[6] 陈利锋, 朱路平.
一种基于云端加密的FPGA自适应动态配置方法
Encrypted Dynamic Configuration Method of FPGA Based on Cloud
计算机科学, 2020, 47(7): 278-281. https://doi.org/10.11896/jsjkx.190700110
[7] 张艳红, 张春光, 周湘贞, 王怡鸥.
项目多属性模糊联合的多样性视频推荐算法
Diverse Video Recommender Algorithm Based on Multi-property Fuzzy Aggregate of Items
计算机科学, 2019, 46(8): 78-83. https://doi.org/10.11896/j.issn.1002-137X.2019.08.012
[8] 张学扶, 曾攀, 金敏.
相关性和相似度联合的癌症分类预测
Cancer Classification Prediction Model Based on Correlation and Similarity
计算机科学, 2019, 46(7): 300-307. https://doi.org/10.11896/j.issn.1002-137X.2019.07.046
[9] 李珊珊, 陈黎, 唐裕婷, 王艺霖, 于中华.
利用整数线性规划自动抽取多样性关键短语
Automatic Extraction of Diversity Keyphrase by Utilizing Integer Liner Programming
计算机科学, 2019, 46(6A): 56-59.
[10] 关晓蔷, 庞继芳, 梁吉业.
基于类别随机化的随机森林算法
Randomization of Classes Based Random Forest Algorithm
计算机科学, 2019, 46(2): 196-201. https://doi.org/10.11896/j.issn.1002-137X.2019.02.030
[11] 张杰鑫, 庞建民, 张铮, 邰铭, 刘浩.
拟态构造Web服务器的服务质量量化方法
QoS Quantification Method for Web Server with Mimic Construction
计算机科学, 2019, 46(11): 109-118. https://doi.org/10.11896/jsjkx.181001922
[12] 王伟, 杨本朝, 李光松, 斯雪明.
异构冗余系统的安全性分析
Security Analysis of Heterogeneous Redundant Systems
计算机科学, 2018, 45(9): 183-186. https://doi.org/10.11896/j.issn.1002-137X.2018.09.030
[13] 石进平,李劲,和凤珍.
基于社交关系和用户偏好的多样性图推荐方法
Diversity Recommendation Approach Based on Social Relationship and User Preference
计算机科学, 2018, 45(6A): 423-427.
[14] 张宇嘉,庞建民,张铮,邬江兴.
基于软件多样化的拟态安全防御策略
Mimic Security Defence Strategy Based on Software Diversity
计算机科学, 2018, 45(2): 215-221. https://doi.org/10.11896/j.issn.1002-137X.2018.02.037
[15] 单天羽, 管煜旸.
基于种群多样性的可变种群缩减差分进化算法
Differential Evolution Algorithm with Adaptive Population Size Reduction Based on Population Diversity
计算机科学, 2018, 45(11A): 160-166.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!