Although the mimic system can effectively defend against known or unknown vulnerabilities / backdoor attacks, some encryption protocols such as SSH will produce different encryption results on different executors, even with the same processor, the same operating system, the same encryption protocol and the same plaintext, which leads to difficulty in output arbitration. To solve this problem, this paper proposes an encryption source normalization method, which can make different executors generate same ciphertext by normalizing the source of the random number and synchronizing the length of output data, so that the output of heterogeneous executers can be successfully arbitrated by the scheduler. This method is verified by experiments using SSH protocol. Test results show that this method can effectively solve the encryption problem of mimic system.
With the wide application of power grids, the massive heterogeneous terminals become important data collection nodes and data relay nodes. However, the openness of the power system exposes the power grid to various security threats. Authentication key agreement protocol can provide authentication and session key sharing services and is the most important technical means to protect the communication security of power grids. However, the design of authentication key agreement protocols for power grids faces many challenges. Firstly, the members of the power grid change frequently, and each new member needs to be authenticated with the edge side equipment every time it joins, so the existing authentication scheme has a large computational overhead. Furthermore, the network communication bandwidth is limited, and the existing schemes have a high time overhead due to the number of communication interactions when performing terminal authentication with the edge side equipment. Finally, the existing schemes all use non-national secret algorithms, which cannot achieve autonomous control. This paper designs a lightweight power grid authentication key agreement protocol based on the state-secure SM9 algorithm to address the above technical challenges. Also, corresponding security proofs based on the threat model of power grids and the existing attack patterns are offered, and code implementation is carried out. It is experimentally verified that the computation time overhead and communication overhead of this scheme are smaller than those of the existing authentication key agreement protocols based on identification cryptosystems.
Serverless computing aims to handle all the system administration operations needed in cloud computing, thus to provide a paradigm that greatly simplifies cloud programming. However, the security in serverless computing is regarded as an independent technology. The lack of security consideration in the initial design makes it difficult to handle the increasingly complicated attack scenario in serverless computing, especially for the vulnerabilities and backdoor based network attack. In this paper, we propose MDSC, a mimic defense enabled paradigm for serverless computing. Specifically, MDSC paradigm introduces Dynamic Heterogeneous Redundancy (DHR) structural model to serverless computing, and make fully use of features introduced by serverless computing to achieve an intrinsic security system with acceptable costs. We show the feasibility of MDSC paradigm by implementing a trial of MDSC paradigm based on Kubernetes and Knative. Analysis and experimental results show that MDSC paradigm can achieve high level security with acceptable cost.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.