• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

计算机工程与科学 ›› 2023, Vol. 45 ›› Issue (02): 204-214.

• 高性能计算 • 上一篇    下一篇

拟态防御体系OSPF协议研究及分析

朱绪全1,江逸茗2,马海龙2,包婉宁1,张进1   

  1. (1.紫金山实验室,江苏 南京 210000;2.国家数字交换系统工程技术研究中心,河南 郑州 450000)
  • 收稿日期:2021-12-07 修回日期:2022-03-07 接受日期:2023-02-25 出版日期:2023-02-25 发布日期:2023-02-15

Research and analysis of OSPF protocol in mimic defense system

ZHU Xu-quan1,JIANG Yi-ming2,MA Hai-long2,BAO Wan-ning1,ZHANG Jin1   

  1. (1.Purple Mountain Laboratories,Nanjing 210000;
    2.National Digital Switching System Engineering and Technology Research Center,Zhengzhou 450000,China)
  • Received:2021-12-07 Revised:2022-03-07 Accepted:2023-02-25 Online:2023-02-25 Published:2023-02-15

摘要: 网络空间拟态防御技术是一种基于动态异构冗余的新型主动防御技术,通过引入多个异构冗余的执行体,增强广义鲁棒性,通过对多个执行体的策略或者周期性调度,对外呈现特征的不确定性变化,增强安全性。路由协议安全是网络安全的重要组成部分,OSPF协议作为网络空间中部署最广泛、实现最复杂的路由协议,如何实现各异构执行体OSPF协议功能的等价,是支持拟态防御的网络设备亟需解决的问题。首先,科学阐述了拟态防御的设计思想,详细描述了支持拟态防御的路由器的体系结构,论述了OSPF协议在拟态防御体系结构中的处理方法,通过引入OSPF协议代理实现各异构执行体OSPF协议功能的等价,在支持拟态防御的路由器原型样机中验证了该方法的可行性和高性能。最后,结合几种经典的OSPF路由攻击产生的路由器安全风险进行了具体说明及实验验证,实验表明该方法能够有效提高其应对OSPF网络攻击的能力。

关键词: 拟态防御, 路由器, OSPF协议, 异构

Abstract: The mimic defense technology in cyberspace is a new active defense technology based on dynamic heterogeneous redundancy. By introducing multiple heterogeneous redundant executants, the generalized robustness is enhanced. By implementing policies or periodic scheduling for multiple executants, the uncertain changes of characteristics are presented externally to enhance security. The security of routing protocol is an important part of network security. OSPF protocol is the most widely deployed and most complex routing protocol in the real network world. The most urgent problem for network devices that supports mimic defense is how to realize the equivalence of OSPF protocol functions among various heterogeneous implementations. Firstly, the design of mimic defense is described scientifically, the architecture of router supporting mimic defense is described in detail, and the processing method of OSPF protocol in the mimic defense architecture is discussed in depth. The OSPF protocol proxy is introduced to realize the equivalence of OSPF protocol functions among various heterogeneous implementations. The feasibility and effectiveness of this method are verified in a router prototype that supports mimic defense. Finally, the security risks of routers under the conditions of two classic OSPF routing attacks are specifically explained and verified by experiments, which effectively improves the ability to deal with OSPF network attacks.

Key words: mimic defense, router, OSPF protocol, heterogeneous