Netinfo Security ›› 2025, Vol. 25 ›› Issue (3): 438-450.doi: 10.3969/j.issn.1671-1122.2025.03.007

Previous Articles     Next Articles

Research on Non-Intrusive Endogenous Security Microservice Model Based on Dynamic Heterogeneous Redundancy

SHI Lei1,2, LI Shibo1, CHENG Guozhen2,3, GAO Yufei1,2()   

  1. 1. School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou 450002, China
    2. Songshan Laboratory, Zhengzhou 450052, China
    3. Institute of Information Technology, Information Engineering University, Zhengzhou 450007, China
  • Received:2024-12-30 Online:2025-03-10 Published:2025-03-26
  • Contact: GAO Yufei E-mail:yfgao@zzu.edu.cn

Abstract:

Cloud-Native applications based on microservices architecture are highly flexible and efficient but also face multiple security threats. Due to the loosely coupled nature, dynamic independent deployment, and collaborative response of microservice architecture, traditional mimetic Web server adjudication strategies are not adaptable, resulting in issues such as low adjudication efficiency, high memory consumption, and high latency. To address these challenges, this paper proposed a non-intrusive endogenous security microservice model (EnSecDHR) based on a dynamic heterogeneous redundant architecture. The model leveraged a cloud-native API gateway to achieve dynamic heterogeneous redundancy transformation of microservice components. It selected the frequency and categories of system calls, kernel stack, and user stack call information as features, constructed a continuous adjudication model based on a whitelisting mechanism, and provided a short-circuit adjudication mechanism for the adjudicator. This avoided the time consumption associated with waiting for the complete response from each component. Comparative experiments were conducted using buffer overflow vulnerability attacks and vulnerability scanning. The results demonstrate that the EnSecDHR model can effectively enhance the security of the proposed Web server while reducing performance loss and resource consumption, thereby improving the microservice adaptability of the DHR architecture.

Key words: microservices, mimic system architecture, dynamic redundancy architecture, non-intrusive techniques

CLC Number: