A Review of Endogenous Security Research

Author:

Liu Xiaoyu1,Wang Haizhou1,Li Cuixia1

Affiliation:

1. School of Cyber Science and Engineering, Zhengzhou University, Zhengzhou 450002, China

Abstract

The development of society has deepened the application of the Internet in production and daily life. At the same time, network security risks are becoming increasingly severe. For the security problems faced in cyberspace, most of the traditional defenses are currently focused on blocking the discovered vulnerabilities. However, these methods not only rely on prior knowledge of vulnerabilities but also fail to address the security issues brought about by the protection program itself. In view of this, endogenous security, which emphasizes the importance of not relying on a priori knowledge and not bringing in new security problems, has received increasing attention. This review provides a detailed introduction to endogenous security and its related issues, which is lacking in the field of network security. Firstly, this paper outlines the detrimental effects of vulnerabilities, identifies issues within moving target defense, and contrasts it with mimic defense. Additionally, the concepts, models, principles, and application scenarios of endogenous security are introduced. Finally, the challenges encountered by this technology are comprehensively summarized, and potential future development trends are further explored.

Publisher

MDPI AG

Reference37 articles.

1. H3C (2024, April 09). Cybersecurity Vulnerability Landscape Report 2023. Report, 2023. [2024-02-29]. Available online: https://download.h3c.com/app/cn/download.do?id=10684557.

2. Wang, X., and Gui, C. (2024, April 09). Cybersecurity Vulnerability Landscape Observations for the First Half of 2022. Report, 2022. [2022-09], Available online: http://www.itsec.gov.cn/zxxw/202209/P020220902118368141314.pdf.

3. Goncalves, M. (2000). Firewall Technical Guide, Machinery Industry Press.

4. Tang, Z. (2004). Introduction to Intrusion Detection Technology, Tsinghua University Publishing House.

5. Research on Technology of Network Security Scan;Hong;Comput. Eng.,2004

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3