PDF(912 KB)
PDF(912 KB)
PDF(912 KB)
基于多内核的操作系统内生安全技术
Endogenous security technology based on multi-kernel operating system
随着数字化、智能化、网络化趋势席卷全球,功能安全与网络安全日益交织、叠加,演变为内生安全问题。操作系统是计算机系统的重要组成部分,是软件架构的基石,操作系统级内生安全至关重要。基于拟态防御的动态异构冗余架构是实现操作系统内生安全的关键技术,但目前面临单内核操作系统不支持内生安全、操作系统级内生安全方案缺失、操作系统层共识机制设计不完善等挑战。本文从操作系统内生安全架构、异构冗余机制、高效通信和共识机制等方面展开分析和设计,提出了一套基于多内核的操作系统内生安全技术方案。
With the trend of digitization,intelligence,and networking sweeping the world,functional security and network security are increasingly intertwined and overlapping,evolving into endogenous security issues.The operating system is an important component of computer systems and the cornerstone of software architecture,and operating system level endogenous security is crucial.The dynamic heterogeneous redundant architecture based on mimetic defense is a key technology for achieving endogenous security in operating systems.However,it currently faces challenges such as single kernel operating systems not supporting endogenous security,lack of operating system level endogenous security solutions,and incomplete design of operating system level consensus mechanisms.This article analyzes and designs an embedded security architecture for operating systems,heterogeneous redundancy mechanisms,efficient communication,and consensus mechanisms,and proposes a multi kernel based embedded security technology solution for operating systems.
multi-kernel operating system / endogenous safety / mimetic defense
| [1] |
|
| [2] |
吴礼发, 洪征, 李华波. 网络攻防原理与技术[M]. 2版. 北京: 机械工业出版社, 2017.
|
| [3] |
|
| [4] |
中兴通讯股份有限公司. 2030+网络内生安全愿景白皮书, 2021.
ZTE Communications Co. 2030+Network Endogenous Security Vision White Paper, 2021 (in Chinese).
|
| [5] |
|
| [6] |
Beijing Topsec Network Security Technology. A network-based data processing method and electronic equipment:China,110311850A[P]. 2019-10-08.
|
| [7] |
Aiming at the unknown vulnerabilities and unknown backdoor security threats faced by Ethernet switches,a switch endogenous security architecture based on mimicry defense theory was proposed.The theoretical basis,construction mode and security mechanism of the architecture ware introduced,the algorithm strategy and security improvement effect of TAMA algorithm were proposed and analyzed,a prototype of mimic switch was designed and implemented,and the security tests of white box stuffing and attack chain were carried out.Theoretical analysis and test results show that the architecture has good unknown vulnerabilities and unknown backdoor defense capabilities in various attack scenarios. |
| [8] |
|
| [9] |
|
| [10] |
|
| [11] |
Scheduling is an important mechanism for the Web server with mimic structure.Most of the existing scheduling algorithms lack consideration about heterogeneity and Quality of Service(QoS) of the Web server with mimic structure,and do not solve the problems of security and service quality instability caused by the scheduling mechanism.Therefore,a scheduling algorithm called Random Seed algorithm based on Maximum heterogeneity and Web QoS(RSMHQ)is proposed.All the thresholds of the Web servers with mimic structure are calculated.The seed executor is randomly selected,and the scheduling scheme is determined according to the maximum heterogeneity and QoS.Simulation results show that compared with the random scheduling algorithm,the proposed algorithm has better scheduling effects and achieves an excellent balance between security,Web service quality and dynamic behaviour.
|
| [12] |
|
| [13] |
Cloud data center is the representative of the new generation of information infrastructure, and its security has become the focus of attention in recent years, which is of great significance.Based on the analysis of the current cloud security situation, the security architecture, key technologies, and implementation methods of the cloud data center through the emerging concept of endogenous security were explored, hoping to use the mimic structure to solve the endogenous safety and security problems such as vulnerabilities and backdoors that were difficult to deal with by the existing means.Moreover, the endogenous security architecture of cloud data centers and related key technologies were proposed, with the mode and trend of mimic transformation.In the future, endogenous safety and security cloud data centers will provide practical solutions for the construction of a new generation of information infrastructure, which may accelerate the technology application and promotion of the cloud service model. |
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
邬江兴. 网络空间拟态防御研究[J]. 信息安全学报, 2016, 1(4):1-10.
|
| [18] |
邬江兴. 网络空间内生安全(上册):拟态防御与广义鲁棒控制[M]. 北京: 科学出版社, 2020.
|
| [19] |
邬江兴. 内生安全赋能网络弹性工程[M]. 北京: 科学出版社, 2023.
|
| [20] |
|
| [21] |
|
| [22] |
Threat adjudication based on the judge method of ruling difference is an important mechanism for the mimic defense system to shield and block the threat of attacks.However,the existing mimic adjudication mechanism cannot conduct effective inductive analysis and threat control on the security situation of the mimic defense systems.Therefore,taking the mimic Web service system as an example,and integrating the network situation awareness technology into the mimic defense architecture,this paper proposes an improved Web threat situation analysis method.The data association is performed on the multi-level mimic adjudication alarm log.The feature data information extracted by fusion is deeply mined and classified.Different types of classification data are visually displayed.Experimental results show that the method can display the security state of the mimic defense systems,and is informed of the running state of the abnormal execution body in time,so as to realize the analysis and evaluation of the security situation of the mimic defense systems.
|
| [23] |
|
| [24] |
|
| [25] |
|
| [26] |
|
| [27] |
In the era of the Internet of things, everything is interconnected. As one of its products, the Internet of Vehicles provides consumers with a convenient way to travel. But at the same time, the safety problems of automobile driving brought by intelligence and network also face various risks, which seriously threaten peoples lives and property safety. Therefore, this article adopts a mimic defense method to design and implement a mimic defense system of Internet of vehicles. Through the collection of vehicle-side threat data and the identification of vehicle serverside threat data, a mimic defense analysis engine is established to effectively protect against various known threats. At the same time, the analysis engine is used to predict the unknown vulnerabilities and threats, thereby forming an active defense behavior. Finally, experiments show that the method can effectively guarantee the safety of the Internet of Vehicles, and provide a strong security support for the security of the Internet of Vehicles business.
|
| [28] |
|
| [29] |
|
| [30] |
|
/
| 〈 |
|
〉 |