Ke SONE, Qinrang LIU, Shuai WEI, et al. Endogenous security architecture of Ethernet switch based on mimic defense[J]. Journal on Communications, 2020, 41(5): 18-26.
DOI:
Ke SONE, Qinrang LIU, Shuai WEI, et al. Endogenous security architecture of Ethernet switch based on mimic defense[J]. Journal on Communications, 2020, 41(5): 18-26. DOI: 10.11959/j.issn.1000-436x.2020098.
Endogenous security architecture of Ethernet switch based on mimic defense
Aiming at the unknown vulnerabilities and unknown backdoor security threats faced by Ethernet switches
a switch endogenous security architecture based on mimicry defense theory was proposed.The theoretical basis
construction mode and security mechanism of the architecture ware introduced
the algorithm strategy and security improvement effect of TAMA algorithm were proposed and analyzed
a prototype of mimic switch was designed and implemented
and the security tests of white box stuffing and attack chain were carried out.Theoretical analysis and test results show that the architecture has good unknown vulnerabilities and unknown backdoor defense capabilities in various attack scenarios.
SHU X H , JIN X X , WU Y . Security treats and prevention of a network switch [J ] . Network Security Technology & Application , 2014 ( 10 ): 130 - 131 .
WU Z H , WEI Q , REN K L , et al . Dynamic defense for DDoS attack using OpenFlow-based switch shuffling approach [J ] . Journal of Electronics & Information Technology , 2017 , 39 ( 2 ): 397 - 404 .
YAN Q , YU F R , GONG Q , et al . Software-defined networking (SDN)and distributed denial of service (DDoS) attacks in cloud computing environments:a survey,some research issues,and challenges [J ] . IEEE Communications Surveys & Tutorials , 2016 , 18 ( 1 ): 602 - 622 .
ZHUANG R , DELOAC H , SCOTT A , et al . A model for analyzing the effect of moving target defenses on enterprise networks [C ] // Proceedings of the 9th Annual Cyber and Information Security Research Conference . New York:ACM Press , 2014 : 73 - 76 .
FENG X T , ZHENG Z Z , DERYA C , et al . A signaling game model for moving target defense [C ] // IEEE INFOCOM 2017-IEEE Conference on Computer Communications . Piscataway:IEEE Press , 2017 : 1 - 4 .
ZAFFARANO K , TAYLOR J , HAMILTON S . A quantitative framework for moving target defense effectiveness evaluation [J ] . Association for Computing Machinery , 2015 ( 10 ): 3 - 11 .
HU H C , CHEN F C , WANG S P . Performance evaluations on DHR for cyberspace mimic defense [J ] . Journal of Cyber Security , 2016 , 1 ( 4 ): 40 - 51 .
MA H L , YI P , JIANG Y M , et al . Dynamic heterogeneous redundancy based router architecture with mimic defenses [J ] . Journal of Cyber Security , 2017 , 2 ( 1 ): 29 - 42 .
WEI S , YU H , GU Z Y , et al . Architecture of mimic security processor for industry control system [J ] . Journal of Cyber Security , 2017 , 2 ( 1 ): 54 - 74 .
邬江兴 . 网络空间拟态防御导论 [M ] . 北京 : 科学出版社 , 2017 .
WU J X . Introduction to cyberspace mimetic defense [M ] . Beijing : Science PressPress , 2017 .