信息网络安全 ›› 2021, Vol. 21 ›› Issue (1): 49-56.doi: 10.3969/j.issn.1671-1122.2021.01.006

• 技术研究 • 上一篇    下一篇

云环境下面向拟态防御的反馈控制方法

陈福才1, 周梦丽1,2, 刘文彦1(), 梁浩1   

  1. 1.国家数字交换系统工程技术研究中心,郑州450002
    2.郑州大学中原网络安全研究院,郑州450002
  • 收稿日期:2020-09-14 出版日期:2021-01-10 发布日期:2021-02-23
  • 通讯作者: 刘文彦 E-mail:lwyndsc@163.com
  • 作者简介:陈福才(1974—),男,江西,教授,硕士,主要研究方向为网络安全|周梦丽(1993—),女,河南,硕士研究生,主要研究方向为云安全|刘文彦(1986—),男,河南,博士,主要研究方向为网络空间防御和云安全|梁浩(1987—),男,河南,博士,主要研究方向为网络空间防御和云安全
  • 基金资助:
    国家自然科学基金(65121003)

Feedback Control Method for Mimic Defense in Cloud Environment

CHEN Fucai1, ZHOU Mengli1,2, LIU Wenyan1(), LIANG Hao1   

  1. 1. National Digital Switching System Engineering & Technology Research Center, Zhengzhou 450002, China
    2. Zhongyuan Network Security Research Institute, Zhengzhou University, Zhengzhou 450002, China
  • Received:2020-09-14 Online:2021-01-10 Published:2021-02-23
  • Contact: LIU Wenyan E-mail:lwyndsc@163.com

摘要:

云环境下的虚拟化技术,给用户带来了一些数据和隐私安全问题。针对云环境中虚拟机单一性、同质性和静态性等问题,文章提出一种云环境下面向拟态防御的反馈控制方法。该方法以云中虚拟机为基础,利用拟态防御技术对虚拟机进行拟态化封装,通过反馈控制架构对其实现闭环负反馈控制,并基于异构虚拟机动态轮换改变执行环境,保证虚拟机系统环境的随机性。实验表明该设计实现了对用户服务的错误容忍、可疑虚拟机检测和动态轮换,增加攻击者利用漏洞攻击的难度。

关键词: 云环境, 拟态防御, 反馈控制, 动态轮换

Abstract:

The virtualization technology in the cloud environment brings some data and privacy security issues to users. Aiming at the problems of the singleness, homogeneity and static stateof virtual machines in the cloud environment, a feedback control method for mimic defense under the cloud environment is proposed. This method is based on the virtual machine in the cloud and uses mimic defense technology to mimic encapsulation of virtual machines, through the feedback control architecture to achieve closed-loop negative feedback control, and based on the dynamic rotation of heterogeneous virtual machines to change the execution environment to ensure the randomness of the virtual machine system environment. Experiments show that the design achieves error tolerance for user services, suspicious virtual machine detection and dynamic rotation, which increases the difficulty for attackers to exploit vulnerabilities.

Key words: cloud environment, mimic defense, feedback control, dynamic rotation

中图分类号: