首页> 外文期刊>Mobile Networks and Applications >ChameleonSoft: Software Behavior Encryption for Moving Target Defense
【24h】

ChameleonSoft: Software Behavior Encryption for Moving Target Defense

机译:ChameleonSoft:用于移动目标防御的软件行为加密

获取原文
获取原文并翻译 | 示例
       

摘要

Ubiquitous cyber systems and their supporting infrastructure impact productivity and quality of life immensely. Their penetration in our daily life increases the need for their enhanced resilience and for means to secure and protect them. One major threat is the contemporary software monoculture. Recent research illustrated the vulnerability of the software monoculture and proposed diversity to reduce the attack surface. In this paper, we propose a biologically-inspired defense system, ChameleonSoft, that employs multidimensional software diversity to, in effect, induce spatiotemporal “software behavior encryption” for moving target defense. The key principles of ChameleonSoft are decoupling functional roles from runtime role players; devising intrinsically-resilient composable online-programmable building blocks; separating logic, state and physical resources; and employing functionally-equivalent, behaviorally-different code variants. ChameleonSoft is also equipped with an autonomic failure recovery mechanism for enhanced resilience. Nodes employing ChameleonSoft autonomously and cooperatively change their recovery and encryption policies both proactively and reactively according to the continual changes in context and environment. Using analysis and simulation, our results show that chameleonsoft can encrypt the execution behavior by confusion and diffusion induction at a reasonable overhead.
机译:无所不在的网络系统及其支持的基础架构会极大地影响生产力和生活质量。它们在我们日常生活中的渗透增加了对它们的适应能力以及保护和保护它们的手段的需求。主要的威胁是当代软件单一文化。最近的研究说明了软件单一文化的脆弱性,并提出了减少攻击面的多样性。在本文中,我们提出了一个具有生物学启发的防御系统ChameleonSoft,该系统利用多维软件多样性来实际上诱导时空的“软件行为加密”以用于移动目标防御。 ChameleonSoft的关键原理是将功能角色与运行时角色播放器分离;设计具有内在弹性的可组合在线可编程构件;分离逻辑,状态和物理资源;并采用功能等效,行为不同的代码变体。 ChameleonSoft还配备了自动故障恢复机制,以增强弹性。采用ChameleonSoft的节点可以根据上下文和环境的不断变化,主动和被动地主动和协作地更改其恢复和加密策略。通过分析和仿真,我们的结果表明chameleonsoft可以在合理的开销下通过混淆和扩散归纳来加密执行行为。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号