期刊文献+

基于随机过程的容侵系统可信性量化方法 被引量:3

Quantifying Dependability of Intrusion Tolerant System Based on Stochastic Processes
下载PDF
导出
摘要 运用马尔可夫过程分析了容侵系统的可信性,结合SITAR容侵系统体系中的状态迁移模型,给出了一种基于随机过程的容侵系统可信性的可用度量化方法。最后在此基础上讨论了入侵容忍系统的性质。 This paper deals with an issues related to quantifying the security dependability of an intrusion tolerant system, such as the state transition model of the SITAR system. A security intrusion and the response of an intrusion tolerant system to an attack is modeled as a stochastic process. By using the theory on the Markov chain, the steady-state availability of an intrusion tolerant system is computed. At last, the character of intrusion tolerant system is also discussed according to the model.
出处 《计算机工程》 EI CAS CSCD 北大核心 2005年第22期7-8,35,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60373087 60473023) 江西省自然科学基金资助项目(511010) 江西省教育厅科研基金资助项目(2005-222)
关键词 可信性 入侵容忍 量化 随机过程 Dependability Intrusion tolerant Quantification Stochastic processes
  • 相关文献

参考文献4

  • 1Deswarte Y, Blain L, Fabre J C. Intrusion Tolerance in Distributed Computing Systems[J]. In: Proc. of the International Symposium on Security and Privacy, IEEE Press, 1991-05:110-121.
  • 2Wang F Y, Gong F M, Chandramouli S, et al. SITAR: A Scalable Intrusion-tolerant Architecture[EB/OL]. http: //www.anr.mcnc.org/projects/SITAR/SITAR- norfoIk-2001 .pdf, 2001.
  • 3Gong F M, Katerina G P, Wang F Y, et al. Characterizing Intrusion Tolerant Systems Using A State Transition Model[EB/OL].http://www.anr.mcnc.org/projects/SITAR/papers/darpa00.pdf, 2000.
  • 4Madan B B, Goseva-Popstojanova K, Vaidyanathan K,et al. Modeling and Quantification of Security Attributes of Software System[A]. In:Proceedings of the International Conference on Dependable Systems and Network (DSN'02), 2002-02:505-514.

同被引文献38

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部