Font Size: a A A

Research On Some Key Technologies In Mimicry Defense System

Posted on:2019-06-18Degree:MasterType:Thesis
Country:ChinaCandidate:H B LiangFull Text:PDF
GTID:2428330548976366Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In recent years,the Internet industry has developed rapidly and Web technology has developed rapidly.The complexity of Web technology is higher than the original,and the corresponding vulnerabilities will increase.The attackers can attack the Web server system easily,and the security problems what the Web server system facing are very serious.On the other hand,the attackers are in the initiative position in the network attack and defense,and the defender is difficult to implement an all-embracing security system.The information asymmetry between the two sides of the offensive and defensive makes the network security a hot research field.In view of the asymmetry of traditional Web defense,the United States has proposed Moving Target Defense,which is expected to establish,evaluate and deploy diversified,non-stop,and time changing mechanisms and strategies to increase the complexity and cost of the attackers,to limit the exposure of the vulnerabilities,to reduce the opportunity have been attacked and to improve the flexibility of the system.Base on the correlation characteristics of the platform of vulnerability,Wu Jiangxing combined with the achievements of predecessors,proposed a Mimicry Defense Model,whose basic principle is Dynamic Heterogeneous Redundancy.Guided by the Dynamic Heterogeneous Redundancy,the work and achievements of this paper are as follows:1)In view of the notice distribution encountered in the implementation of Dynamic Heterogeneous Redundancy Architecture,a dispatcher is implemented.The dispatcher improvement model is proposed for saving its insufficient time and space occupancy,which can also support Session.The model improves the effect on replicating request process in the dispatcher by the way named "head replication and body link".The dispatcher can support Session by the hash table virtual Session,so it can not only dispatch the user requests more quickly,but also provide more perfect function,and the model has better time performance and space occupancy.2)A voting device have been implemented when the voting requirement had been proposed in Dynamic Heterogeneous Redundancy.In addition,to solve these problems that its high complexity about time and space and the empty waiting of voting device.This paper puts forward a more advanced voting stream processing model,which uses buffer space stores the data packages,and then creates the corresponding queue for each buffer area.The model starts voting operation with putting data packages to hash table and return the completed voting results to the user in real-time.The voting device can reduce the delay and improve the efficiency.Finally,it provides a more efficient solution for the whole system.3)This paper builds a prototype system of Dynamic Heterogeneous Redundancy Architecture by the dispatcher and voting device.The experiment proves that the proposed dispatcher and flow processing voting device is effective and efficient.
Keywords/Search Tags:Moving Target Defense, Web Security, Mimicry Defense, Dynamic Heterogeneous Redundancy
PDF Full Text Request
Related items