A Review of Endogenous Security Research

被引:2
|
作者
Liu, Xiaoyu [1 ]
Wang, Haizhou [1 ]
Li, Cuixia [1 ]
机构
[1] Zhengzhou Univ, Sch Cyber Sci & Engn, Zhengzhou 450002, Peoples R China
关键词
endogenous security; mimic defense; dynamic heterogeneous redundancy;
D O I
10.3390/electronics13112185
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of society has deepened the application of the Internet in production and daily life. At the same time, network security risks are becoming increasingly severe. For the security problems faced in cyberspace, most of the traditional defenses are currently focused on blocking the discovered vulnerabilities. However, these methods not only rely on prior knowledge of vulnerabilities but also fail to address the security issues brought about by the protection program itself. In view of this, endogenous security, which emphasizes the importance of not relying on a priori knowledge and not bringing in new security problems, has received increasing attention. This review provides a detailed introduction to endogenous security and its related issues, which is lacking in the field of network security. Firstly, this paper outlines the detrimental effects of vulnerabilities, identifies issues within moving target defense, and contrasts it with mimic defense. Additionally, the concepts, models, principles, and application scenarios of endogenous security are introduced. Finally, the challenges encountered by this technology are comprehensively summarized, and potential future development trends are further explored.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] A review of available software for the creation of testbeds for Internet security research
    Siaterlis, Christos
    Masera, Marcelo
    SIMUL: 2009 FIRST INTERNATIONAL CONFERENCE ON ADVANCES IN SYSTEM SIMULATION, 2009, : 79 - 87
  • [22] Research on endogenous security data sharing mechanism of F-RAN for 6G
    Liu Y.
    Li J.
    Chen W.
    Peng M.
    1600, Editorial Board of Journal on Communications (42): : 67 - 78
  • [23] Security Attacks in Named Data Networking: A Review and Research Directions
    Kumar, Naveen
    Singh, Ashutosh Kumar
    Aleem, Abdul
    Srivastava, Shashank
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2019, 34 (06) : 1319 - 1350
  • [24] Research Landscape of Patterns and Architectures for IoT Security: A Systematic Review
    Rajmohan, Tanusan
    Nguyen, Phu H.
    Ferry, Nicolas
    2020 46TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2020), 2020, : 463 - 470
  • [25] Research Framework and Anticipated Results of New Network Architecture and Key Technologies Supported by Endogenous Security
    Li T.
    Lan X.
    Li B.
    Wang W.
    Li L.
    Wang L.
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2023, 55 (02): : 1 - 13
  • [26] Review on Security Defense Technology Research in Edge Computing Environment
    Shang, Ke
    He, Weizhen
    Zhang, Shuai
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (01) : 1 - 18
  • [27] Review on Security Defense Technology Research in Edge Computing Environment
    Ke SHANG
    Weizhen HE
    Shuai ZHANG
    Chinese Journal of Electronics, 2024, 33 (01) : 1 - 18
  • [28] A Review of Research on Security of Cloud Service Platform in Medical Environment
    Liu, Kun
    Chen, Chunling
    Guo, Jianjun
    Li, Qi
    Guo, Yongan
    2019 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS - TAIWAN (ICCE-TW), 2019,
  • [29] Review and prospect of research on frequency security of new power system
    Han Z.
    Ju P.
    Qin C.
    Sun D.
    Sun H.
    Zheng Y.
    Dianli Zidonghua Shebei/Electric Power Automation Equipment, 2023, 43 (09): : 112 - 124
  • [30] A Systematic Review of Information Security Knowledge-Sharing Research
    Al-Ahmari, S.
    Renaud, K.
    Omoronyia, I.
    PROCEEDINGS OF THE TWELFTH INTERNATIONAL SYMPOSIUM ON HUMAN ASPECTS OF INFORMATION SECURITY & ASSURANCE (HAISA 2018), 2018, : 101 - 110