A Generalized Information Security Model SOCMD for CMD Systems

被引:0
|
作者
ZHANG Baowen [1 ]
CHANG Xiao [1 ]
LI Jianhua [1 ]
机构
[1] School of Cyberspace Security Technology and Research, Shanghai Jiaotong University
基金
中国国家自然科学基金;
关键词
Cyber mimic defense; Dynamic heterogeneous redundancy; Network security; Security model; Ontology;
D O I
暂无
中图分类号
TP393.08 [];
学科分类号
0839 ; 1402 ;
摘要
As a new security defense theory, Cyberspace mimic defense(CMD) provides an architecture named Dynamic heterogeneous redundancy(DHR) to enhance the defense level of system security. Due to the new dynamic defense mechanism DHR introduced in CMD systems, traditional security modelling and analysis methods can hardly be used for them. In this paper, we propose a Security ontology-based modelling method for CMD systems(SOCMD), which uses ontology to represent DHR components and to define their inner relationships. SOCMD also connects information components including DHRs with security vulnerabilities,threats and attackers in cyberspace. Next, attacking rules,multi-mode arbitration mechanism and combination rules are designed with SOCMD for CMD systems and a new logical-checking method is proposed to make judgement about the security state of SOCMD. Finally, different use cases and performance tests are developed to demonstrate the application process for the model and to verify the validity of our method.
引用
收藏
页码:417 / 426
页数:10
相关论文
共 50 条
  • [1] A Generalized Information Security Model SOCMD for CMD Systems
    Zhang Baowen
    Chang Xiao
    Li Jianhua
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2020, 29 (03) : 417 - 426
  • [2] A Simulation Model of Information Systems Security
    Pendegraft, Norman
    Rounds, Mark
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2007, 1 (04) : 62 - 74
  • [3] A Grey Model for Evaluation of Information Systems Security
    Shi, Huawang
    Deng, Yong
    [J]. JOURNAL OF COMPUTERS, 2012, 7 (01) : 284 - 291
  • [4] A model of return on investment for information systems security
    Al-Humaigani, M
    Dunn, DB
    [J]. Proceedings of the 46th IEEE International Midwest Symposium on Circuits & Systems, Vols 1-3, 2003, : 483 - 485
  • [5] A security risk analysis model for information systems
    In, HP
    Kim, YG
    Lee, T
    Moon, CJ
    Jung, YJ
    Kim, I
    [J]. SYSTEMS MODELING AND SIMULATION: THEORY AND APPLICATIONS, 2005, 3398 : 505 - 513
  • [6] A security policy model for clinical information systems
    Anderson, RJ
    [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 30 - 43
  • [7] Information security for automated systems: An integral model
    Men'shikov, VA
    Ukhlinov, LM
    [J]. AUTOMATION AND REMOTE CONTROL, 1997, 58 (05) : 855 - 859
  • [8] An innovative model to manage the information systems security threats
    Fujs, Damjan
    Vrhovec, Simon L. R.
    Vavpotic, Damjan
    [J]. ELEKTROTEHNISKI VESTNIK, 2020, 87 (03): : 109 - 116
  • [9] A security evaluation model and toolkit for enterprise information systems
    Yan, Q.
    [J]. FRONTIERS IN ENTERPRISE INTEGRATION, 2008, : 27 - 32
  • [10] A knowledgeable security model for distributed health information systems
    Xiao, Liang
    Hu, Bo
    Croitoru, Madalina
    Lewis, Paul
    Dasmahapatra, Srinandan
    [J]. COMPUTERS & SECURITY, 2010, 29 (03) : 331 - 349