拟态防御技术结合软件多样化在软件安全产业中的应用
随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统的软件安全措施是依靠对漏洞进行修补,其只能起到亡羊补牢的作用。软件多样化技术可以使这种情况得到缓解,但其并没有从根本上消除漏洞带来的威胁。本文提出将拟态防御技术与软件多样化技术相结合应用于软件安全产业,可以消除漏洞带来的威胁。...
Saved in:
Published in | 中国工程科学 Vol. 18; no. 6; pp. 74 - 78 |
---|---|
Main Author | |
Format | Journal Article |
Language | Chinese |
Published |
中国工程院战略咨询中心
01.06.2016
高等教育出版社有限公司 中国人民解放军信息工程大学数学工程与先进计算国家重点实验室,郑州,450001%中国人民解放军信息工程大学国家数字交换系统工程技术研究中心,郑州,450002 |
Subjects | |
Online Access | Get full text |
ISSN | 1009-1742 2096-0034 |
DOI | 10.15302/J-SSCAE-2016.06.015 |
Cover
Abstract | 随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统的软件安全措施是依靠对漏洞进行修补,其只能起到亡羊补牢的作用。软件多样化技术可以使这种情况得到缓解,但其并没有从根本上消除漏洞带来的威胁。本文提出将拟态防御技术与软件多样化技术相结合应用于软件安全产业,可以消除漏洞带来的威胁。 |
---|---|
AbstractList | 随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统的软件安全措施是依靠对漏洞进行修补,其只能起到亡羊补牢的作用。软件多样化技术可以使这种情况得到缓解,但其并没有从根本上消除漏洞带来的威胁。本文提出将拟态防御技术与软件多样化技术相结合应用于软件安全产业,可以消除漏洞带来的威胁。 TN915; 随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统的软件安全措施是依靠对漏洞进行修补,其只能起到亡羊补牢的作用。软件多样化技术可以使这种情况得到缓解,但其并没有从根本上消除漏洞带来的威胁。本文提出将拟态防御技术与软件多样化技术相结合应用于软件安全产业,可以消除漏洞带来的威胁。 |
Abstract_FL | With the development of the Internet, the process of computer software globalization continues to push forward. For widely used software, anidentical binary code is installed on millions of computers;sometimes even hundreds of millions. This makes widespread exploitation easy and attractive for an attacker because the same attack vector is likely to succeed on a large number of targets. Traditional software security methods can only counter the threat temporarily, and cannot eliminate essential vulnerabilities. This paper proposes a scheme of combining software diversity with mimic defense in the software security industry. |
Author | 庞建民 张宇嘉 张铮 邬江兴 |
AuthorAffiliation | 中国人民解放军信息工程大学数学工程与先进计算国家重点实验室,郑州450001 中国人民解放军信息工程大学国家数字交换系统工程技术研究中心,郑州450002 |
AuthorAffiliation_xml | – name: 中国人民解放军信息工程大学数学工程与先进计算国家重点实验室,郑州,450001%中国人民解放军信息工程大学国家数字交换系统工程技术研究中心,郑州,450002 |
Author_FL | Wu Jiangxing Zhang Zheng Zhang Yujia Pang Jianmin |
Author_FL_xml | – sequence: 1 fullname: Pang Jianmin – sequence: 2 fullname: Zhang Yujia – sequence: 3 fullname: Zhang Zheng – sequence: 4 fullname: Wu Jiangxing |
Author_xml | – sequence: 1 fullname: 庞建民 张宇嘉 张铮 邬江兴 |
BookMark | eNpNkMtKw0AYhQepYK19AXHlxlXqXJLJzLKUapWCi3Yfkpkk1kuqDeJlVUHB20KwiJSCCoLZaMGFlhZ9miTVtzDSLoQDP5zzcX440yDl1T0bgDkEc0gjEC-uKpVKIV9UMEQ0BxMhbQKkMeRUgZCoKZBGEHIF6SqeAlnfr1lQRZhiDeM0KMWX93Hz-OfuLfp6jC-acac7HNxE12ffn91w8B49teOHj-jqNuoEY-f1PDoNwv5z2GuHvZdh-yTqt4atYAZMOuaWb2fHNwOqS8VqoaSU15ZXCvmyInSmKZI7GicSI10KYunIFoRCbklbMEaZ5UgLMRMJIbhFGZZISGo5JlRVSnSdQUYyYGFUu296jum5xkZ9r-ElD40j1xWbB38jQJpMkJCzI1KYvm94vi8NqkPOVUZ4Es6Pw_W65-7WkqKdRm3bbBz-g34B59B_yw |
ClassificationCodes | TN915 |
ContentType | Journal Article |
Copyright | Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
Copyright_xml | – notice: Copyright © Wanfang Data Co. Ltd. All Rights Reserved. |
DBID | 2RA 92L CQIGP W92 ~WA NSCOK 2B. 4A8 92I 93N PSX TCJ |
DOI | 10.15302/J-SSCAE-2016.06.015 |
DatabaseName | 中文科技期刊数据库 中文科技期刊数据库-CALIS站点 维普中文期刊数据库 中文科技期刊数据库-工程技术 中文科技期刊数据库- 镜像站点 National Center for Philosophy and Social Sciences Documentation (NCPSSD) Wanfang Data Journals - Hong Kong WANFANG Data Centre Wanfang Data Journals 万方数据期刊 - 香港版 China Online Journals (COJ) China Online Journals (COJ) |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
DocumentTitleAlternate | Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry |
DocumentTitle_FL | Applying a Combination of Mimic Defense and Software Diversity in the Software Security Industry |
EISSN | 2096-0034 |
EndPage | 78 |
ExternalDocumentID | zggckx201606015 670994839 |
GrantInformation_xml | – fundername: 中国工程院重大咨询项目“网络空间安全战略研究” funderid: (2015-ZD-10) |
GroupedDBID | -0C -SC -S~ 2RA 5VR 92L 92M 92R 93N 9D9 9DC AAITT AFUIB ALMA_UNASSIGNED_HOLDINGS CAJEC CAJUS CQIGP CW7 FA0 GROUPED_DOAJ J.9 JUIAU M~T NSCOK NTYSC PB1 PB9 Q-- Q-2 R-C RT3 T8S U1F U5C W92 ~WA AAXDM ABGRJ 2B. 4A8 92I PSX TCJ |
ID | FETCH-LOGICAL-c785-d9f593d217dc3b71ec3609bdec8868bfdb18a1ccc9b682d1cd6bfa04463778083 |
ISSN | 1009-1742 |
IngestDate | Thu May 29 04:02:38 EDT 2025 Tue Jan 21 20:54:06 EST 2025 Wed Feb 14 10:05:50 EST 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | true |
Issue | 6 |
Keywords | 拟态防御 软件多样化 软件安全产业 software diversity mimic defense software security product |
Language | Chinese |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c785-d9f593d217dc3b71ec3609bdec8868bfdb18a1ccc9b682d1cd6bfa04463778083 |
Notes | With the development of the Internet, the process of computer software globalization continues to push forward. For widely used software, anidentical binary code is installed on millions of computers; sometimes even hundreds of millions. This makes widespread exploitation easy and attractive for an attacker because the same attack vector is likely to succeed on a large number of targets. Traditional software security methods can only counter the threat temporarily, and cannot eliminate essential vulnerabilities. This paper proposes a scheme of combining software diversity with mimic defense in the software security industry. software diversity; mimic defense; software security product 11-4421/G3 Pang Jianmin1, Zhang Yujia1, Zhang Zheng1, Wu Jiangxing2 (1. State Key Laboratory of Mathematical Engineering and Advanced Computing, The PLA Information Engineering University, Zhengzhou 450001, China; 2. National Digital Switching System Engineering & Technological R&D Center, The PLA Information Engineering University |
OpenAccessLink | https://www.ncpssd.cn/Literature/articleinfo?id=670994839&type=journalArticle |
PageCount | 5 |
ParticipantIDs | wanfang_journals_zggckx201606015 cass_nssd_670994839 chongqing_primary_670994839 |
PublicationCentury | 2000 |
PublicationDate | 2016-06-01 |
PublicationDateYYYYMMDD | 2016-06-01 |
PublicationDate_xml | – month: 06 year: 2016 text: 2016-06-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | 中国工程科学 |
PublicationTitleAlternate | Engineering Science |
PublicationYear | 2016 |
Publisher | 中国工程院战略咨询中心 高等教育出版社有限公司 中国人民解放军信息工程大学数学工程与先进计算国家重点实验室,郑州,450001%中国人民解放军信息工程大学国家数字交换系统工程技术研究中心,郑州,450002 |
Publisher_xml | – name: 中国工程院战略咨询中心 – name: 高等教育出版社有限公司 – name: 中国人民解放军信息工程大学数学工程与先进计算国家重点实验室,郑州,450001%中国人民解放军信息工程大学国家数字交换系统工程技术研究中心,郑州,450002 |
SSID | ssib041262522 ssib000271367 ssj0002857239 ssib051368723 ssib006564177 ssib017478303 ssib036436351 ssib044765437 |
Score | 2.0650601 |
Snippet | 随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统的软件安全... TN915; 随着互联网的飞速发展,计算机软件全球化的进程不断推进。大量相同软件安装在数以万计的计算机中,容易导致黑客利用软件的漏洞,攻击安装了该软件的所有计算机。传统... |
SourceID | wanfang cass chongqing |
SourceType | Aggregation Database Publisher |
StartPage | 74 |
SubjectTerms | 拟态防御 软件多样化 软件安全产业 |
Title | 拟态防御技术结合软件多样化在软件安全产业中的应用 |
URI | http://lib.cqvip.com/qk/83379X/201606/670994839.html https://www.ncpssd.cn/Literature/articleinfo?id=670994839&type=journalArticle https://d.wanfangdata.com.cn/periodical/zggckx201606015 |
Volume | 18 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
journalDatabaseRights | – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2096-0034 dateEnd: 99991231 omitProxy: true ssIdentifier: ssib044765437 issn: 1009-1742 databaseCode: M~E dateStart: 19990101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnR1Na9RAdGjrRQ9Sq2KtSg_OqaTmYyaZOU62KUWol1bobUkmyRaFrbotSA9SQcGvg2ARKQUVBHvRggctLfprNlv9F743G3dDW0W9hJf3MR9vksmbybz3CLksfc4yN0jgTdPSYr7LLOE53EqSlNmpSHOdo4Pz7DV_5jq7usAXBgaHK6eWVpaTSb16pF_J_4wq4GBc0Uv2H0a2VyggAIbxhSuMMFz_aoxp5FMRUjltABusQhpJKgUNXRpxGkZUOYakkAqArFEFzAENQcpDHglSgkYgMmVIDEmhjyTFqFQopWwaBogRNSoNCcv5nVREhTTM3PAASVEVGECYAg2gprAZcCuYaaqikhkMA6mqxVzhh3pDrBH5A6o48kMVoAEEQNYxDYAm9bYbf5UdGSBEGDoU2sA7YVA17F3ZbNNH0J6QVZpETaloAiHhUlUzJThG66aXIatunTh-_4hXOdubXBBBN7zXZGZwro2nsu1yh_XQJ-LAfN_NMFRaDt1cRIe-SZiXCfNtW3NzNRVZ2BATMrbrxnog2jeG05MMrNZBcswNfB-Tcszei6o_ijHIXn_K5D5z-q7EDqZD8Po_1j0wOMGk7E3hzHFhwduP2MhYgM7FPXkOhYugtBhvmL1XDrfSnBkolVU6oGK3rhzRKbBtNKz7MFbJ4lKzcRssMOMQ18zjZqNiu80Pk5Plomtcdd-gU2RgdXGEnKiE4jxNZjpPX3fW7v949an49rbzZK2zub2_96J4_uj71-323ufi3UbnzZfi2ctic6vEfHxcPNxq775v72y0dz7sbzwodtf317fOkPnpaL42Y5VZRiwdCG6lMufSS2FlnmovCZxMe74tkzTTQvgiydPEEbGjtZaJL9zU0amf5DEeg_CCQMAC5iwZai41s3NkPGY85njSQGQpc3QsvDj1RI47LrkNC4tRMoKaqTdbrbTeG-hRMtZTVP1WN8RMlTpeqq5eTjyt-mqjoW_eRZVjMCV-_o8FjJHj_Uf_AhlavrOSXQQ7ejm5ZJ6sn__unaw |
linkProvider | ISSN International Centre |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=%E6%8B%9F%E6%80%81%E9%98%B2%E5%BE%A1%E6%8A%80%E6%9C%AF%E7%BB%93%E5%90%88%E8%BD%AF%E4%BB%B6%E5%A4%9A%E6%A0%B7%E5%8C%96%E5%9C%A8%E8%BD%AF%E4%BB%B6%E5%AE%89%E5%85%A8%E4%BA%A7%E4%B8%9A%E4%B8%AD%E7%9A%84%E5%BA%94%E7%94%A8&rft.jtitle=%E4%B8%AD%E5%9B%BD%E5%B7%A5%E7%A8%8B%E7%A7%91%E5%AD%A6&rft.au=%E5%BA%9E%E5%BB%BA%E6%B0%91+%E5%BC%A0%E5%AE%87%E5%98%89+%E5%BC%A0%E9%93%AE+%E9%82%AC%E6%B1%9F%E5%85%B4&rft.date=2016-06-01&rft.issn=1009-1742&rft.eissn=2096-0034&rft.volume=18&rft.issue=6&rft.spage=74&rft.epage=78&rft_id=info:doi/10.15302%2FJ-SSCAE-2016.06.015&rft.externalDocID=670994839 |
thumbnail_s | http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fimage.cqvip.com%2Fvip1000%2Fqk%2F83379X%2F83379X.jpg http://utb.summon.serialssolutions.com/2.0.0/image/custom?url=http%3A%2F%2Fwww.wanfangdata.com.cn%2Fimages%2FPeriodicalImages%2Fzggckx%2Fzggckx.jpg |