To address the high risk of vulnerability and backdoor exploitation in homogeneous microservice environments, a dynamic heterogeneous scheduling method based on the FlipIt game is proposed. First, heterogeneous resource pools are constructed using diversified container images, where distinct container deployments are regarded as differentiated defense strategies. The heterogeneity of containers is quantified from multiple dimensions. Second, the attacker-defender interaction is modeled as a single-stage FlipIt game. By introducing a discount factor and transition probability, the model is extended to a multi-stage dynamic game. Finally, experimental results validate the effectiveness of the proposed method. The results show that the defense revenue of the proposed method is improved by an average of 4.04 times compared to those of full-service rotation and random defense strategies. In multi-stage game scenarios, the defender’s average revenue consistently exceeds the attacker’s, indicating superior defensive performance.
GAOX, STEENKAMERB, GUZ S, et al. A study on the security implications of information leakages in container clouds[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(1):174-191.
[4]
ALSHAMRANIA, MYNENIS, CHOWDHARYA, et al. A survey on advanced persistent threats: techniques, solutions, challenges, and research opportunities[J]. IEEE Communications Surveys & Tutorials, 2019,21(2):1851-1877.
[5]
SHAMSHIRBANDS, FATHIM, CHRONOPOULOSA T, et al. Computational intelligence intrusion detection techniques in mobile cloud computing environments: review, taxonomy, and open research issues[J]. Journal of Information Security and Applications, 2020,55:No.102582.
[6]
YUT Q, WANGX B. Topology verification enabled intrusion detection for in-vehicle CAN-FD networks[J]. IEEE Communications Letters, 2020,24(1):227-230.
[7]
ZHANGY H, DENGR H, XUS M, et al. Attribute-based encryption for cloud computing access control: a survey[J]. ACM Computing Surveys (CSUR), 2020,53(4):No.83.
[8]
陈福才,扈红超,刘文彦,网络空间主动防御技术[M].北京:科学出版社,2018:1-19.
[9]
ALAVIZADEHH, HONGJ B, KIMD S, et al. Evaluating the effectiveness of shuffle and redundancy mtd techniques in the cloud[J]. Computers & Security, 2021,102:No.102091.