拟态防御技术结合软件多样化在软件安全产业中的应用

随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统的软件安全措施是依靠对漏洞进行修补,其只能起到亡羊补牢的作用。软件多样化技术可以使这种情况得到缓解,但其并没有从根本上消除漏洞带来的威胁。本文提出将拟态防御技术与软件多样化技术相结合应用于软件安全产业,可以消除漏洞带来的威胁。...

Full description

Saved in:
Bibliographic Details
Published in中国工程科学 Vol. 18; no. 6; pp. 74 - 78
Main Author 庞建民 张宇嘉 张铮 邬江兴
Format Journal Article
LanguageChinese
Published 中国工程院战略咨询中心 01.06.2016
高等教育出版社有限公司
中国人民解放军信息工程大学数学工程与先进计算国家重点实验室,郑州,450001%中国人民解放军信息工程大学国家数字交换系统工程技术研究中心,郑州,450002
Subjects
Online AccessGet full text
ISSN1009-1742
2096-0034
DOI10.15302/J-SSCAE-2016.06.015

Cover

Abstract 随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统的软件安全措施是依靠对漏洞进行修补,其只能起到亡羊补牢的作用。软件多样化技术可以使这种情况得到缓解,但其并没有从根本上消除漏洞带来的威胁。本文提出将拟态防御技术与软件多样化技术相结合应用于软件安全产业,可以消除漏洞带来的威胁。
AbstractList 随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统的软件安全措施是依靠对漏洞进行修补,其只能起到亡羊补牢的作用。软件多样化技术可以使这种情况得到缓解,但其并没有从根本上消除漏洞带来的威胁。本文提出将拟态防御技术与软件多样化技术相结合应用于软件安全产业,可以消除漏洞带来的威胁。
TN915; 随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统的软件安全措施是依靠对漏洞进行修补,其只能起到亡羊补牢的作用。软件多样化技术可以使这种情况得到缓解,但其并没有从根本上消除漏洞带来的威胁。本文提出将拟态防御技术与软件多样化技术相结合应用于软件安全产业,可以消除漏洞带来的威胁。
Abstract_FL With the development of the Internet, the process of computer software globalization continues to push forward. For widely used software, anidentical binary code is installed on millions of computers;sometimes even hundreds of millions. This makes widespread exploitation easy and attractive for an attacker because the same attack vector is likely to succeed on a large number of targets. Traditional software security methods can only counter the threat temporarily, and cannot eliminate essential vulnerabilities. This paper proposes a scheme of combining software diversity with mimic defense in the software security industry.
Author 庞建民 张宇嘉 张铮 邬江兴
AuthorAffiliation 中国人民解放军信息工程大学数学工程与先进计算国家重点实验室,郑州450001 中国人民解放军信息工程大学国家数字交换系统工程技术研究中心,郑州450002
AuthorAffiliation_xml – name: 中国人民解放军信息工程大学数学工程与先进计算国家重点实验室,郑州,450001%中国人民解放军信息工程大学国家数字交换系统工程技术研究中心,郑州,450002
Author_FL Wu Jiangxing
Zhang Zheng
Zhang Yujia
Pang Jianmin
Author_FL_xml – sequence: 1
  fullname: Pang Jianmin
– sequence: 2
  fullname: Zhang Yujia
– sequence: 3
  fullname: Zhang Zheng
– sequence: 4
  fullname: Wu Jiangxing
Author_xml – sequence: 1
  fullname: 庞建民 张宇嘉 张铮 邬江兴
BookMark eNpNkMtKw0AYhQepYK19AXHlxlXqXJLJzLKUapWCi3Yfkpkk1kuqDeJlVUHB20KwiJSCCoLZaMGFlhZ9miTVtzDSLoQDP5zzcX440yDl1T0bgDkEc0gjEC-uKpVKIV9UMEQ0BxMhbQKkMeRUgZCoKZBGEHIF6SqeAlnfr1lQRZhiDeM0KMWX93Hz-OfuLfp6jC-acac7HNxE12ffn91w8B49teOHj-jqNuoEY-f1PDoNwv5z2GuHvZdh-yTqt4atYAZMOuaWb2fHNwOqS8VqoaSU15ZXCvmyInSmKZI7GicSI10KYunIFoRCbklbMEaZ5UgLMRMJIbhFGZZISGo5JlRVSnSdQUYyYGFUu296jum5xkZ9r-ElD40j1xWbB38jQJpMkJCzI1KYvm94vi8NqkPOVUZ4Es6Pw_W65-7WkqKdRm3bbBz-g34B59B_yw
ClassificationCodes TN915
ContentType Journal Article
Copyright Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
Copyright_xml – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved.
DBID 2RA
92L
CQIGP
W92
~WA
NSCOK
2B.
4A8
92I
93N
PSX
TCJ
DOI 10.15302/J-SSCAE-2016.06.015
DatabaseName 中文科技期刊数据库
中文科技期刊数据库-CALIS站点
维普中文期刊数据库
中文科技期刊数据库-工程技术
中文科技期刊数据库- 镜像站点
National Center for Philosophy and Social Sciences Documentation (NCPSSD)
Wanfang Data Journals - Hong Kong
WANFANG Data Centre
Wanfang Data Journals
万方数据期刊 - 香港版
China Online Journals (COJ)
China Online Journals (COJ)
DatabaseTitleList


DeliveryMethod fulltext_linktorsrc
Discipline Engineering
DocumentTitleAlternate Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry
DocumentTitle_FL Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry
EISSN 2096-0034
EndPage 78
ExternalDocumentID zggckx201606015
670994839
GrantInformation_xml – fundername: 中国工程院重大咨询项目“网络空间安全战略研究”
  funderid: (2015-ZD-10)
GroupedDBID -0C
-SC
-S~
2RA
5VR
92L
92M
92R
93N
9D9
9DC
AAITT
AFUIB
ALMA_UNASSIGNED_HOLDINGS
CAJEC
CAJUS
CQIGP
CW7
FA0
GROUPED_DOAJ
J.9
JUIAU
M~T
NSCOK
NTYSC
PB1
PB9
Q--
Q-2
R-C
RT3
T8S
U1F
U5C
W92
~WA
AAXDM
ABGRJ
2B.
4A8
92I
PSX
TCJ
ID FETCH-LOGICAL-c785-d9f593d217dc3b71ec3609bdec8868bfdb18a1ccc9b682d1cd6bfa04463778083
ISSN 1009-1742
IngestDate Thu May 29 04:02:38 EDT 2025
Tue Jan 21 20:54:06 EST 2025
Wed Feb 14 10:05:50 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 6
Keywords 拟态防御
软件多样化
软件安全产业
software diversity
mimic defense
software security product
Language Chinese
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c785-d9f593d217dc3b71ec3609bdec8868bfdb18a1ccc9b682d1cd6bfa04463778083
Notes With the development of the Internet, the process of computer software globalization continues to push forward. For widely used software, anidentical binary code is installed on millions of computers; sometimes even hundreds of millions. This makes widespread exploitation easy and attractive for an attacker because the same attack vector is likely to succeed on a large number of targets. Traditional software security methods can only counter the threat temporarily, and cannot eliminate essential vulnerabilities. This paper proposes a scheme of combining software diversity with mimic defense in the software security industry.
software diversity; mimic defense; software security product
11-4421/G3
Pang Jianmin1, Zhang Yujia1, Zhang Zheng1, Wu Jiangxing2 (1. State Key Laboratory of Mathematical Engineering and Advanced Computing, The PLA Information Engineering University, Zhengzhou 450001, China; 2. National Digital Switching System Engineering & Technological R&D Center, The PLA Information Engineering University
OpenAccessLink https://www.ncpssd.cn/Literature/articleinfo?id=670994839&type=journalArticle
PageCount 5
ParticipantIDs wanfang_journals_zggckx201606015
cass_nssd_670994839
chongqing_primary_670994839
PublicationCentury 2000
PublicationDate 2016-06-01
PublicationDateYYYYMMDD 2016-06-01
PublicationDate_xml – month: 06
  year: 2016
  text: 2016-06-01
  day: 01
PublicationDecade 2010
PublicationTitle 中国工程科学
PublicationTitleAlternate Engineering Science
PublicationYear 2016
Publisher 中国工程院战略咨询中心
高等教育出版社有限公司
中国人民解放军信息工程大学数学工程与先进计算国家重点实验室,郑州,450001%中国人民解放军信息工程大学国家数字交换系统工程技术研究中心,郑州,450002
Publisher_xml – name: 中国工程院战略咨询中心
– name: 高等教育出版社有限公司
– name: 中国人民解放军信息工程大学数学工程与先进计算国家重点实验室,郑州,450001%中国人民解放军信息工程大学国家数字交换系统工程技术研究中心,郑州,450002
SSID ssib041262522
ssib000271367
ssj0002857239
ssib051368723
ssib006564177
ssib017478303
ssib036436351
ssib044765437
Score 2.0650601
Snippet 随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统的软件安全...
TN915; 随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统...
SourceID wanfang
cass
chongqing
SourceType Aggregation Database
Publisher
StartPage 74
SubjectTerms 拟态防御
软件多样化
软件安全产业
Title 拟态防御技术结合软件多样化在软件安全产业中的应用
URI http://lib.cqvip.com/qk/83379X/201606/670994839.html
https://www.ncpssd.cn/Literature/articleinfo?id=670994839&type=journalArticle
https://d.wanfangdata.com.cn/periodical/zggckx201606015
Volume 18
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2096-0034
  dateEnd: 99991231
  omitProxy: true
  ssIdentifier: ssib044765437
  issn: 1009-1742
  databaseCode: M~E
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1Na9RAdGjrRQ9Sq2KtSg_OqaTmYyaZOU62KUWol1bobUkmyRaFrbotSA9SQcGvg2ARKQUVBHvRggctLfprNlv9F743G3dDW0W9hJf3MR9vksmbybz3CLksfc4yN0jgTdPSYr7LLOE53EqSlNmpSHOdo4Pz7DV_5jq7usAXBgaHK6eWVpaTSb16pF_J_4wq4GBc0Uv2H0a2VyggAIbxhSuMMFz_aoxp5FMRUjltABusQhpJKgUNXRpxGkZUOYakkAqArFEFzAENQcpDHglSgkYgMmVIDEmhjyTFqFQopWwaBogRNSoNCcv5nVREhTTM3PAASVEVGECYAg2gprAZcCuYaaqikhkMA6mqxVzhh3pDrBH5A6o48kMVoAEEQNYxDYAm9bYbf5UdGSBEGDoU2sA7YVA17F3ZbNNH0J6QVZpETaloAiHhUlUzJThG66aXIatunTh-_4hXOdubXBBBN7zXZGZwro2nsu1yh_XQJ-LAfN_NMFRaDt1cRIe-SZiXCfNtW3NzNRVZ2BATMrbrxnog2jeG05MMrNZBcswNfB-Tcszei6o_ijHIXn_K5D5z-q7EDqZD8Po_1j0wOMGk7E3hzHFhwduP2MhYgM7FPXkOhYugtBhvmL1XDrfSnBkolVU6oGK3rhzRKbBtNKz7MFbJ4lKzcRssMOMQ18zjZqNiu80Pk5Plomtcdd-gU2RgdXGEnKiE4jxNZjpPX3fW7v949an49rbzZK2zub2_96J4_uj71-323ufi3UbnzZfi2ctic6vEfHxcPNxq775v72y0dz7sbzwodtf317fOkPnpaL42Y5VZRiwdCG6lMufSS2FlnmovCZxMe74tkzTTQvgiydPEEbGjtZaJL9zU0amf5DEeg_CCQMAC5iwZai41s3NkPGY85njSQGQpc3QsvDj1RI47LrkNC4tRMoKaqTdbrbTeG-hRMtZTVP1WN8RMlTpeqq5eTjyt-mqjoW_eRZVjMCV-_o8FjJHj_Uf_AhlavrOSXQQ7ejm5ZJ6sn__unaw
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E6%8B%9F%E6%80%81%E9%98%B2%E5%BE%A1%E6%8A%80%E6%9C%AF%E7%BB%93%E5%90%88%E8%BD%AF%E4%BB%B6%E5%A4%9A%E6%A0%B7%E5%8C%96%E5%9C%A8%E8%BD%AF%E4%BB%B6%E5%AE%89%E5%85%A8%E4%BA%A7%E4%B8%9A%E4%B8%AD%E7%9A%84%E5%BA%94%E7%94%A8&rft.jtitle=%E4%B8%AD%E5%9B%BD%E5%B7%A5%E7%A8%8B%E7%A7%91%E5%AD%A6&rft.au=%E5%BA%9E%E5%BB%BA%E6%B0%91+%E5%BC%A0%E5%AE%87%E5%98%89+%E5%BC%A0%E9%93%AE+%E9%82%AC%E6%B1%9F%E5%85%B4&rft.date=2016-06-01&rft.issn=1009-1742&rft.eissn=2096-0034&rft.volume=18&rft.issue=6&rft.spage=74&rft.epage=78&rft_id=info:doi/10.15302%2FJ-SSCAE-2016.06.015&rft.externalDocID=670994839
thumbnail_s http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F83379X%2F83379X.jpg
http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fzggckx%2Fzggckx.jpg