期刊文献+

基于自适应大数表决机制的容忍入侵模型 被引量:12

Intrusion tolerant architecture with adaptive majority voting mechanism
下载PDF
导出
摘要 针对容忍入侵系统中自适应能力较差的问题,提出了一种基于自适应大数表决机制的容忍入侵系统模型。该模型采用了适当的复制技术和自适应大数表决技术,使系统即使在遭受到恶意攻志的情况下仍能安全、可靠地运行,并能有效地识别出有故障的复制品,从而达到了容忍入侵的目的。通过使用基于前几轮表决的历史记录,使得表决器表决出的输出值更准确、更可靠并能及时地移除掉有故障的复制品。分析表明,方案具有安全性强,可靠性高,系统性能好以及易于实现等优点,特别适应用于对系统安全性、可靠性、可生存性,以及系统效率要求较高的分布式环境中。 Current intrusion tolerant systems have some limits on adaptability. To solve this problem, a novel intrusion tolerant architecture with adaptive majority voting mechanism is proposed, which can be used to mask the effects of intrusion, thus ensuring systems survivability. Both replication and adaptive majority voting are used in the model to provide correct and reliable services for the system continually and to detect the faulty replicas despite the existence of fault or intrusion, thus achieving the effect of intrusion tolerance. The output of current voting is produced by using the history records of previous several voting, so the results are more correct and reliable than the traditional majority voting. Analysis shows that this method has many advantages over those available ones' such as high security and reliability, reasonable performance and easy realization.
出处 《系统工程与电子技术》 EI CSCD 北大核心 2005年第6期1098-1101,共4页 Systems Engineering and Electronics
基金 国家自然科学基金重大研究计划项目(90204012) 国家"863"高技术研究发展计划课题(2002AA143021) 教育部优秀青年教师资助计划 教育部科学技术重点研究项目 总装备部武器装备基金项目资助课题
关键词 容忍入侵 自适应大数表决 复制品 历史记录 intrusion tolerant adaptive majority voting replica history record
  • 相关文献

参考文献6

  • 1Reynolds J, James Just, Ed Lawson, et al. The design and implementation of an imtrustion tolerant system [ C ]. Proc. of Int'l Conference on Dependable Systems and Networks, Washington D.C., 2002. 258- 290.
  • 2Wang F, Gong F, Jou F, et al. SITAR: a scalable intrustion tolerance architecture for distributed service[C]. Proc. of IEEE Workshop on Informatiion Assurance and Security, 2001. 38 - 45.
  • 3David Sames, Brian Matt, David Bakken. Developing a heterogeneous intrusion tolerant CORBA system [ C ]. Proc. of the International Conference on Dependable Systems & Networks,Washing, D. C. , 2002. 239-248.
  • 4Wang F, Uppalli R, Killian C. Analysis of techniques for building intrusion tolerant server systems[ C]. Proc. of Military Communications Conference, Washington DC, 2003. 729 734.
  • 5Ben Hardekopf, Kevin Kwiat. Shambhu upadhyaya. Secure and fault-tolerant voting in distributed systems [C]. Proc. of IEEE Aerospace Conference, 2001. 1117- 1127.
  • 6Priya Narasimhan, Kim Potter Kihlstrom. The starfish system:providing intrusion destection and intrusion tolerance for middleware systems[ C]. Proc. of IEEE Workshop on Object-Oriented RealTime Dependable Systems, 2003. 191-199.

同被引文献135

引证文献12

二级引证文献42

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部