检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:张琳[1] 李焕洲[1] 张健[1] 唐彰国[1] Zhang Lin;Li Huanzhou;Zhang Jian;Tang Zhangguo(Institute of Computer Network&Communication Technology,Sichuan Normal University,Chengdu 610101,China)
机构地区:[1]四川师范大学网络与通信技术研究所,成都610101
出 处:《计算机应用研究》2021年第11期3433-3438,共6页Application Research of Computers
基 金:国家自然科学基金资助项目(U1836103);四川省科技计划资助项目(2018GFW0063)。
摘 要:针对物联网设备很容易被攻击者利用来入侵网络的问题,设计实现了一种将基于网络拓扑改组的移动目标防御(network topology shuffling-based moving target defense,NTS-MTD)和网络欺骗相结合的物联网集成防御机制,并基于该防御机制设计了一种诱饵路径优化算法(decoy path-based optimization algorithm,DPOA)来进行网络拓扑改组优化。在软件定义网络(software defined network,SDN)的支持下主动改变真实节点和诱饵节点的网络拓扑,实现物联网环境中的网络拓扑改组。通过一个带有安全度量的图形安全模型(graphical security model,GSM)研究防御机制有效性,并使用三个指标对DPOA的安全性和性能进行衡量。仿真结果表明,基于DPOA的方案防御成本显著降低且安全性高,更适应于物联网。Aiming at the problem that Internet of Things devices are easy to be used by attackers to invade the network,this paper designed and implemented an integrated defense mechanism of Internet of Things,which combined network topology shuffling-based moving target defense and cyber deception.And based on this defense mechanism,this paper designed a decoy path-based optimization algorithm to optimize the network topology.With the support of software defined network,changing the network topology of real nodes and decoy nodes actively to realize the network topology shuffling in the Internet of Things.This paper studied the effectiveness of defense mechanism through a graphical security model with security metrics,and used three indicators to measure the security and performance of DPOA.The simulation results show that the defense cost of the scheme based on DPOA is significantly reduced and the security is high,which is more suitable for the Internet of Things.
分 类 号:TP393[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.128.24.183