Boosting Multimode Ruling in DHR Architecture With Metamorphic Relations

Author:

Li Ruosi12,Kong Xianglong2ORCID,Guo Wei3,Guo Jingdong4,Li Hongfa4,Zhang Fan3

Affiliation:

1. School of Cyber Science and Engineering Southeast University Nanjing China

2. Endogenous Security Research Center Purple Mountain Laboratories Nanjing China

3. Department of Integrative Design National Digital Switching System and Engineering Technological Research Center Zhengzhou China

4. Department of Digitalization State Grid Fujian Electric Power Co., Ltd. Fuzhou China

Abstract

ABSTRACTThe DHR architecture provides a revolutionary security defense structure for cyberspace. The multimode ruling in DHR is expected to alleviate the oracle problem, which still suffers from the existence of common model vulnerability. In this work, we design a test segmentation method to transform multimode ruling to a metamorphic testing problem. The text test input that causes inconsistency of heterogeneous executors is converted to a condition set, and we extract subsets of conditions based on its syntax tree. The original test can exploit a specific vulnerability, the follow‐up tests are composed by different subsets of conditions within the original test. We collect the execution matrix for the follow‐up tests to analyse the impact of each subset of conditions on ruling decision. Metamorphic relations are extracted based on the localization of independent condition, that is, the subsets of conditions that can impact ruling decision independently. The executors in an inconsistent ruling should be examined with metamorphic testing methods, rather than traditional majority voting mechanism. The proposed test segmentation and improved multimode ruling methods are evaluated on two DHR‐based cases, SQL injection in cyber‐range system and deserialization attack in ‐ project. The experimental results show that our test segmentation can help to locate malicious expressions and the metamorphic testing‐based multimode ruling can generate more correct results than majority voting mechanism with an average 15.8% performance loss.

Funder

State Grid Corporation of China

Publisher

Wiley

Reference45 articles.

1. Wireless Networks;Wu J.,2020

2. Cyberspace's Endogenous Safety and Security Problem and the Countermeasures;Wu J.;Scientia Sinica Informationis,2022

3. Development Paradigms of Cyberspace Endogenous Safety and Security;Wu J.;Science China Information Sciences,2022

4. Dynamic Web Application Firewall detection supported by Cyber Mimic Defense approach

5. Problems and Solutions Regarding Generalized Functional Safety in Cyberspace;Wu J.;Security and Safety,2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3