A Review of Endogenous Security Research

被引:2
|
作者
Liu, Xiaoyu [1 ]
Wang, Haizhou [1 ]
Li, Cuixia [1 ]
机构
[1] Zhengzhou Univ, Sch Cyber Sci & Engn, Zhengzhou 450002, Peoples R China
关键词
endogenous security; mimic defense; dynamic heterogeneous redundancy;
D O I
10.3390/electronics13112185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of society has deepened the application of the Internet in production and daily life. At the same time, network security risks are becoming increasingly severe. For the security problems faced in cyberspace, most of the traditional defenses are currently focused on blocking the discovered vulnerabilities. However, these methods not only rely on prior knowledge of vulnerabilities but also fail to address the security issues brought about by the protection program itself. In view of this, endogenous security, which emphasizes the importance of not relying on a priori knowledge and not bringing in new security problems, has received increasing attention. This review provides a detailed introduction to endogenous security and its related issues, which is lacking in the field of network security. Firstly, this paper outlines the detrimental effects of vulnerabilities, identifies issues within moving target defense, and contrasts it with mimic defense. Additionally, the concepts, models, principles, and application scenarios of endogenous security are introduced. Finally, the challenges encountered by this technology are comprehensively summarized, and potential future development trends are further explored.
引用
收藏
页数:15
相关论文
共 50 条
  • [1] Review of medical security research in china
    Cong, Haoting
    BASIC & CLINICAL PHARMACOLOGY & TOXICOLOGY, 2020, 127 : 291 - 291
  • [2] Research on the Construction of Endogenous Industrial Security in Early Warning Index System
    Qian, Jin
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND MANAGEMENT INNOVATION (MSMI 2017), 2017, 31 : 121 - 125
  • [3] Review of Security Research on Address Resolution Protocols
    Song Guangjia
    Ji Zhenzhou
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 385 - 404
  • [4] Examining Circle of Security: A Review of Research and Theory
    Mercer, Jean
    RESEARCH ON SOCIAL WORK PRACTICE, 2015, 25 (03) : 382 - 392
  • [5] Systematic Literature Review of Security Pattern Research
    Washizaki, Hironori
    Xia, Tian
    Kamata, Natsumi
    Fukazawa, Yoshiaki
    Kanuka, Hideyuki
    Kato, Takehisa
    Yoshino, Masayuki
    Okubo, Takao
    Ogata, Shinpei
    Kaiya, Haruhiko
    Hazeyama, Atsuo
    Tanaka, Takafumi
    Yoshioka, Nobukazu
    Priyalakshmi, G.
    INFORMATION, 2021, 12 (01) : 1 - 27
  • [6] Review of Research on Information Security in Federated Learning
    Duan, Xinru
    Chen, Guirong
    Chen, Aiwang
    Chen, Chen
    Ji, Weifeng
    Computer Engineering and Applications, 2024, 60 (03) : 61 - 77
  • [7] Endogenous Security Formal Definition, Innovation Mechanisms, and Experiment Research in Industrial Internet
    Chen, Hongsong
    Han, Xintong
    Zhang, Yiying
    TSINGHUA SCIENCE AND TECHNOLOGY, 2024, 29 (02): : 492 - 505
  • [8] REVIEW OF SECURITY AND THE STATE 1979 - STATE-RESEARCH
    不详
    JOURNAL OF PEACE RESEARCH, 1980, 17 (01) : 88 - 88
  • [9] Research communities in cyber security: A comprehensive literature review
    Katsikeas, Sotirios
    Johnson, Pontus
    Ekstedt, Mathias
    Lagerstrom, Robert
    COMPUTER SCIENCE REVIEW, 2021, 42
  • [10] Organizational information security policies: a review and research framework
    Cram, W. Alec
    Proudfoot, Jeffrey G.
    D'Arcy, John
    EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2017, 26 (06) : 605 - 641