作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2024, Vol. 50 ›› Issue (2): 165-179. doi: 10.19678/j.issn.1000-3428.0066958

• 网络空间安全 • 上一篇    下一篇

容器云中面向持久化存储的拟态防御技术研究

刘道清1,*(), 扈红超1,2, 霍树民1,2   

  1. 1. 信息工程大学信息技术研究所, 河南 郑州 450000
    2. 紫金山实验室, 江苏 南京 210000
  • 收稿日期:2023-02-16 出版日期:2024-02-15 发布日期:2024-02-21
  • 通讯作者: 刘道清
  • 基金资助:
    国家自然科学基金(62072467); 国家重点研发计划(2021YFB1006200); 国家重点研发计划(2021YFB1006201)

Research on Persistent Storage-Oriented Mimic Defense Technology in Container Clouds

Daoqing LIU1,*(), Hongchao HU1,2, Shumin HUO1,2   

  1. 1. Institute of Information Technology, University of Information Engineering, Zhengzhou 450000, Henan, China
    2. Purple Mountain Laboratories, Nanjing 210000, Jiangsu, China
  • Received:2023-02-16 Online:2024-02-15 Published:2024-02-21
  • Contact: Daoqing LIU

摘要:

容器云中面向持久化存储安全会直接影响到容器的创建和运行过程,严重威胁容器的安全性。传统的防御方法无法及时检测基于未知漏洞的攻击行为,并建立相应的防御策略。而现有的通过动态、异构和冗余增强容器及持久化存储安全性的研究缺乏对面向持久化存储安全威胁的细致分析,且对表决机制带来的性能损失没有得到优化。为此,利用容器灵活、高效的特点,结合拟态防御原理提出面向持久化存储的拟态防御架构。针对表决机制并结合层次分析法对异构容器应用请求表决机制进行优化,同时依据先到先裁机制提出一种自适应表决算法以提高表决速率,通过评估安全性和系统开销为用户提供一种折中的调度方案来满足场景中不同的安全和性能需求,最终实现原型系统Mimic-proxy。理论分析和实验结果表明:Mimic-proxy可以有效防御容器云中面向持久化存储的安全威胁,相比传统表决算法,响应时延降低了28.85%,吞吐率提高了40.52%;相比于传统防御架构,在仅提高0.99%的响应时延和降低1.01%吞吐率的情况下,可以有效保护持久化存储,达到增强容器安全性的目的。

关键词: 容器云, 持久化存储, 拟态防御, 原型系统, 容器安全

Abstract:

Persistent storage security threats in the container cloud directly affect the creation and operation of the container. Traditional defense methods cannot detect an attack based on unknown vulnerabilities in time and establish corresponding defense strategies. Existing studies on enhancing the security of the container and persistent storage through dynamic, heterogeneous and redundant lack detailed analyses of the persistent storage security threats. The performance loss caused by the voting mechanism has also not been optimized. To this end, this paper first proposes a mimic defense architecture for persistent storage based on the flexible and efficient characteristics of containers and the principle of mimic defense for the aforementioned problems. Second, the analytic hierarchy process method is used to optimize the request voting mechanism of heterogeneous container applications. Thereafter, an adaptive voting algorithm is proposed based on the first-come-first-decision mechanism to improve the voting rate. Next, users are provided with an optional scheduling scheme to improve the adaptability of the architecture by evaluating the security and system overhead. Finally, this study implements a prototype system mimic-proxy. Theoretical analysis and experimental verification results demonstrate that mimic-proxy can effectively defend against persistent storage security threats in the container cloud. The adaptive voting algorithm reduces the response delay by 28.85% and improves the throughput by 40.52% compared with the traditional voting algorithm. Compared with the traditional defense architecture, the adaptive voting algorithm can effectively protect the persistent storage and enhance the container security under the condition of increasing the response delay by 0.99% and reducing the throughput by 1.01%.

Key words: container cloud, persistent storage, mimic defense, prototype system, container safety