REN Quan, WU Jiangxing, HE Lei, “Performance Modeling Based on GSPN for Cyberspace Mimic DNS,” Chinese Journal of Electronics, vol. 29, no. 4, pp. 738-749, 2020, doi: 10.1049/cje.2020.05.001
Citation: REN Quan, WU Jiangxing, HE Lei, “Performance Modeling Based on GSPN for Cyberspace Mimic DNS,” Chinese Journal of Electronics, vol. 29, no. 4, pp. 738-749, 2020, doi: 10.1049/cje.2020.05.001

Performance Modeling Based on GSPN for Cyberspace Mimic DNS

doi: 10.1049/cje.2020.05.001
Funds:  This work is supported by the National Key Research and Development Plan (No.2018YFB0804002).
  • Received Date: 2018-12-26
  • Rev Recd Date: 2019-06-03
  • Publish Date: 2020-07-10
  • Cyberspace mimic domain name system (CMDNS) adopts dynamic heterogeneous redundant architecture with strategic decision mechanism to control the effectiveness of uncertain disturbance. There is lack of methods to evaluate the availability and awareness security of CMDNS. To further describe and analyze the characteristics of CMDNS accurately, the Generalized stochastic Petri net (GSPN) is used to model the attack disturbance and defense of mimic Domain name system (DNS), and the availability and awareness security of Dissimilar redundancy system (DRS) and mimic DNS under different disturbance intensities are compared. We compared the different effect of local service query and real network query on the average response delay. The results show that the introduction of mimic architecture will inevitably pay the corresponding delay cost which increase 9.3% compared with traditional local DNS, but it has little effect on the service which only increases by 1.9% compared with the DNS transmission delay at the network communication level.
  • loading
  • W.A. Cram, J.G. Proudfoot and J. D'Arcy, “Organizational information security policies: A review and research framework”, European Journal of Information Systems, Vol.26, No.6, pp.605-641, 2016.
    N.Y. Conteh and P.J. Schmick, “Cybersecurity:risks, vulnerabilities and countermeasures to prevent social engineering attacks”, International Journal of Advanced Research in Computer Science, Vol.6, No.23, pp.31-38, 2016.
    R. Zuech, T.M. Khoshgoftaar and R. Wald, “Intrusion detection and big heterogeneous data: A survey”, Journal of Big Data, Vol.2, No.1, pp.3, 2015.
    P. Hu, H. Li and H. Fu, “Dynamic defense strategy against advanced persistent threat with insiders”, IEEE Conference on Computer Communications, Hong Kong. China, pp.747-755, 2015.
    T. Fang, L. Shen and W. He, “Distributed control and redundant technique to achieve superior reliability for fully modular input-series-output-parallel inverter system”, IEEE Transactions on Power Electronics, Vol.32, No.1, pp.723-735, 2016.
    S. Jajodia, A.K. Ghosh and Swarup V., “Moving target defense: Creating asymmetric uncertainty for Cyber threats”, Springer Publishing Company, New York, USA, 2011.
    J. Wu, “Meaning and vision of mimic computing and mimic security defense”, Telecommunications Science, Vol.30, No.7, pp.2-7, 2014.
    S. Distefano and L. Xing, “A new approach to modeling the system reliability: Dynamic reliability block diagrams”, Rams'06 Reliability and Maintainability Symposium, IEEE Computer Society, Newport Beach, CA, USA, pp.189-195, 2006.
    J. Jin, L. Pang and S.Zhao, et al., “Quantitative assessment of probability of failing safely for the safety instrumented system using reliability block diagram method”, Annals of Nuclear Energy, Vol.77, pp.30-34, 2015.
    B. Nystrom, L. Austrin, N. Ankarback, et al., “Fault tree analysis of an aircraft electric power supply system to electrical actuators”, IEEE International Conference on Probabilistic Methods Applied To Power Systems, Stockholm, Sweden, pp.1-7, 2006.
    E.E. Hurdle, L.M. Bartlett and J.D. Andrews, “Fault diagnostics of dynamic system operation using a fault tree based method”, Reliability Engineering & System Safety, Vol.94, No.9, pp.1371-1380, 2009.
    A.H. Ranjbar, M. Kiani and B. Fahimi, “Dynamic Markov model for reliability evaluation of power electronic systems”, IEEE International Conference on Power Engineering, Energy and Electrical Drives, Malaga, Spain, pp.1-6, 2011.
    K.D. Rao, V. Gopika, V.V.S.S. Rao, et al., “Dynamic fault tree analysis using Monte Carlo simulation in probabilistic safety assessment”, Reliability Engineering & System Safety, Vol.94, No.4, pp.872-883, 2009.
    J. Dawkins, C. Campbell, J. Hale, “Modeling network attacks: Extending the attack tree paradigm”, Detection Johns Hopkins University, 2002.
    R. Indrajit and P. Nayot “Using attack trees to identify malicious attacks from authorized insiders”, Lecture Notes in Computer Science, Vol.3679, pp.231-246, 2005.
    P. Ammann, D. Wijesekera and S. Kaushik, “Scalable, graphbased network vulnerability analysis”, ACM Conference on Computer and Communications Security, CCS 2002, Washington, D.C., USA, pp.217-224, 2002.
    O. Sheyner, J. Haines, S. Jha, et al., “Automated generation and analysis of attack graphs”, IEEE Symposium on Security and Privacy, Berkeley, CA, USA, pp.273, 2002.
    L.P. Swiler, C. Phillips and T. Gaylor, “A graph-based network-vulnerability analysis system”, Sandia National Laboratories Albuquerque New, USDOE, Washington, USA, pp.97-3010, 1998.
    T. Li, “An immunity based network security risk estimation”, Science China Information Sciences, Vol.48, No.5, pp.557-578, 2005.
    C. Lin, “Performance evaluation of computer networks and computer systems”, Tsinghua University Press, Beijing, China, pp.165-181, 2001.
    J. Shi, Y.X. Meng, S.P. Wang, et al., “Standard Analysis for Transfer Delay in CTCS-3”, Chinese Journal of Electronics, Vol.26, No.5, pp.1057-1063, 2017.
    J. Shi, Y.X. Meng, S.P. Wang, et al., “Reliability and safety analysis of redundant vehicle management computer system”, Chinese Journal of Aeronautics, Vol.26, No.5, pp.1290-1302, 2013.
    S.P. Wang, X.Y. Cui, J. Shi, et al., “Modeling of reliability and performance assessment of a dissimilar redundancy actuation system with failure monitoring”, Chinese Journal of Aeronautics, Vol.29, No.3, pp.799-813, 2016.
    W.C. Moody, H. Hu and A. Apon, “Defensive maneuver cyber platform modeling with stochastic Petri nets”, IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Miami, FL, USA, pp.531-538, 2015.
    R. Mitchell, I.R. Chen, “Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems”, IEEE Transactions on Reliability, Vol.65, No.1, pp.350-358, 2015.
    G. Cai, B. Wang, Y. Luo, et al., “A model for evaluating and comparing moving target defense techniques based on generalized stochastic petri net”, Conference on Advanced Computer Architecture, Singapore, pp.194-197, 2016.
    M. Garcia, A. Bessani, I. Gashi, et al., “Analysis of operating system diversity for intrusion tolerance”, Software—practice & Experience, Vol.44, No.6, pp.735-770, 2014.
    T.M. Chen, J.C. Sanchez-Aarnoutse and J. Buford, “Petri net modeling of cyber-physical attacks on smart grid”, IEEE Transactions on Smart Grid, Vol.2, No.4, pp.741-749, 2011.
    R. Mitchell and I.R. Chen, “Effect of intrusion detection and response on reliability of cyber physical systems”, IEEE Transactions on Reliability, Vol.62, No.1, pp.199-210, 2013.
    M. Ajmone Marsan, G. Conte and G. Balbo, “A class of generalized stochastic Petri nets for the performance evaluation of multiprocessor systems”, ACM Transactions on Computer Systems, Vol.2, No.2, pp.93-122, 1984.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (380) PDF downloads(98) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return