Computer Science ›› 2018, Vol. 45 ›› Issue (9): 183-186.doi: 10.11896/j.issn.1002-137X.2018.09.030

• Information Security • Previous Articles     Next Articles

Security Analysis of Heterogeneous Redundant Systems

WANG Wei, YANG Ben-chao, LI Guang-song, SI Xue-ming   

  1. State Key Laboratory of Mathematical Engineering and Advanced Computing,Information Engineering University,Zhengzhou 450001,China
  • Received:2017-08-01 Online:2018-09-20 Published:2018-10-10

Abstract: With the development and popularization of Internet technology,vulnerability and backdoor problems have become the main factor of network security problems.The redundancy technology can solve the reliability problem of system.Inspired by the idea of the mimicry defense,this paper analyzed the effectiveness of the heterogeneous redundant technology against the security defense based on the vulnerability and backdoor network attack.On some assumptions,this paper established a security model of heterogeneous redundant system based on Markov process.System security was characterized by the success rate of system attack,and the expression of success rate of system attack was given.At last,triple-redundant heterogeneous system was solved and analyed.The experimental results are in accordance with the intuitive expectations.

Key words: Heterogeneous redundancy, Markov, Mimic defense, Vulnerability backdoor

CLC Number: 

  • TP309.1
[1]吴世忠,郭涛,董国伟,等.软件漏洞分析技术[M].北京:科学出版社,2014.
[2]WU J X.Meaning and Vision of Mimic Computing and Mimic Security Defense[J].Telecommunications Science,2014,30(7):2-7.(in Chinese)
邬江兴.拟态计算与拟态安全防御的原意和愿景[J].电信科学,2014,30(7):2-7.
[3]WU J X.Mimic Security Defense in Cyber Space[J].Secrecy
Science and Technology,2014(10):4-9.(in Chinese)
邬江兴.网络空间拟态安全防御[J].保密科学技术,2014(10):4-9.
[4]WU J X.Research on Cyber Mimic Defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese)
邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10.
[5]MARVIN R.System Reliability Theory:Models,Statistical Me-thods,and Applications(Second Edition)[M].Beijing:National Defend Industry Press,2011.(in Chinese)
MARVIN R.系统可靠性理论:模型、统计方法及应用(第2版)[M].北京:国防工业出版社,2011.
[6]SUN H Y,LIU B,CAO X L.Research on reliability and security
of vote redundancy system[J].Journal of Electronic Measurement and Instrument,2011,25(7):661-664.(in Chinese)
孙怀义,刘斌,曹晓莉.表决冗余系统可靠性与安全性研究[J].电子测量与仪器学报,2011,25(7):661-664.
[7]LI C Y,CHEN X,YI X S,et al.Analysis of k—out-of-n:G systems subject to common cause failures based on Markov process[J].Systems Engineering and Electronics,2009,31(11):2789-2792.(in Chinese)
李春洋,陈循,易晓山,等.基于马尔可夫过程的k/n(G)系统共因失效分析[J].系统工程与电子技术,2009,31(11):2789-2792.
[8]LIU Y,LI R Z,ZHANG G B.Reliability analysis of k/n(G) Markov system with non-homogenous units[J].Journal of Huazhong University of Science and Technology(Natural Science Edition),2015,43(3):17-21.(in Chinese)
刘英,李荣祖,张根保.非同型单元k/n(G)马尔可夫系统可靠性分析[J].华中科技大学学报(自然科学版),2015,43(3):17-21.
[9]YIN L H,FANG B X.Security Attributes Analysis for Intrusion Tolerant Systems[J].Chinese Journal of Computers,2006,29(8):1505-1512.(in Chinese)
殷丽华,方滨兴.入侵容忍系统安全属性分析[J].计算机学报,2006,29(8):1505-1512.
[10]MADAN B B,GOSEVA-POPSTOJANOVA K,VAIDYANAT-HAN K,et al.A method for modeling and quantifying the securi-ty attributes of intrusion tolerant systems [J].Performance Evaluation,2004,56(1-4):167-186.
[11]ZANG H W,HAN W,GAO D Y.Dissimilar redundancy computer system and reliability analysis[J].Journal of Harbin Institute of Technology,2008,40(3):492-494.(in Chinese)
臧红伟,韩炜,高德远.非相似余度计算机系统及其可靠性分析[J].哈尔滨工业大学学报,2008,40(3):492-494.
[12]YE Y,XU X S,JIA Y,et al.An Attack Graph-Based Probabilistic Computing Approach of Network Security[J].Chinese Journal of Computers,2010,33(10):1987-1996.(in Chinese)
叶云,徐锡山,贾焰,等.基于攻击图的网络安全概率计算方法[J].计算机学报,2010,33(10):1987-1996.
[1] XIE Bai-lin, LI Qi, KUANG Jiang. Microblog Popular Information Detection Based on Hidden Semi-Markov Model [J]. Computer Science, 2022, 49(6A): 291-296.
[2] ZHOU Qin, LUO Fei, DING Wei-chao, GU Chun-hua, ZHENG Shuai. Double Speedy Q-Learning Based on Successive Over Relaxation [J]. Computer Science, 2022, 49(3): 239-245.
[3] ZHANG Fan, GONG Ao-yu, DENG Lei, LIU Fang, LIN Yan, ZHANG Yi-jin. Wireless Downlink Scheduling with Deadline Constraint for Realistic Channel Observation Environment [J]. Computer Science, 2021, 48(9): 264-270.
[4] YANG Lin, WANG Yong-jie, ZHANG Jun. FAWA:A Negative Feedback Dynamic Scheduling Algorithm for Heterogeneous Executor [J]. Computer Science, 2021, 48(8): 284-290.
[5] WANG Ying-kai, WANG Qing-shan. Reinforcement Learning Based Energy Allocation Strategy for Multi-access Wireless Communications with Energy Harvesting [J]. Computer Science, 2021, 48(7): 333-339.
[6] FANG Ting, GONG Ao-yu, ZHANG Fan, LIN Yan, JIA Lin-qiong, ZHANG Yi-jin. Dynamic Broadcasting Strategy in Cognitive Radio Networks Under Delivery Deadline [J]. Computer Science, 2021, 48(7): 340-346.
[7] LUO Jing-jie, WANG Yong-li. ADCSM:A Fine-grained Driving Cycle Model Construction Method [J]. Computer Science, 2021, 48(6A): 289-294.
[8] ZHANG Kai, LIU Jing-ju. Attack Path Analysis Method Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(5): 294-300.
[9] WU Pei-pei, WU Zhao-xian, TANG Wen-bing. Real-time Performance Analysis of Intelligent Unmanned Vehicle System Based on Absorbing Markov Chain [J]. Computer Science, 2021, 48(11A): 147-153.
[10] YU Li, DU Qi-han, YUE Bo-yan, XIANG Jun-yao, XU Guan-yu, LENG You-fang. Survey of Reinforcement Learning Based Recommender Systems [J]. Computer Science, 2021, 48(10): 1-18.
[11] MA Chuang, YUAN Ye and YOU Hai-sheng. Agricultural Product Output Forecasting Method Based on Grey-Markov Model [J]. Computer Science, 2020, 47(6A): 535-539.
[12] WEI De-bin,YANG Peng,YANG Li,SHI Huai-feng. Virtual Network Function Fast Mapping Algorithm over Satellite Network [J]. Computer Science, 2020, 47(3): 248-254.
[13] SONG Chang,YU Ke,WU Xiao-fei. Fake Account Detection Method in Online Social Network Based on Improved Edge Weighted Paired Markov Random Field Model [J]. Computer Science, 2020, 47(2): 251-255.
[14] ZHANG Cheng-wei, LUO Feng-e, DAI Yi. Prediction Method of Flight Delay in Designated Flight Plan Based on Data Mining [J]. Computer Science, 2020, 47(11A): 464-470.
[15] ZHANG Jing, YANG Jian, SU Peng. Survey of Monosyllable Recognition in Speech Recognition [J]. Computer Science, 2020, 47(11A): 172-174.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!