期刊文献+

用错误围堵策略建立可生存的网络安全设备内核

Utilizing Fault Containment to Construct a Survivable Network Security Device Kernel
下载PDF
导出
摘要 提出在IBM虚拟机器的架构上,使用错误围堵策略建立可生存的网络安全设备内核的思想。建立有效的资源管理器,分割、调度机器资源,把物理资源提供给虚拟机器,平衡错误围堵与其它的性能要求。利用软件和硬件错误围堵技术制约对系统攻击引起的错误,防止一个错误引起整个系统的崩溃。用以上策略建立了内核模型,给它加上大负荷,正常和异常的工作。实验结果显示:即使在系统中某些部分出错的情况下,依然不影响系统的整体性能,并且错误围堵的开销几乎可以忽略不计。 Fault containment is proposed to construct a survivable kemel of the network security device based on the IBM virtual machine. This is aecemplished by setting up an efficient resource manager to supply physical resources to the virtual machine and to balance other performance requirements. Software and hardware fault containment technology is used to protect against system attacks, and avoid a system breakdown from a single fault. Model and tests prove this idea and the overheads are almost negligible.
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2005年第6期30-34,共5页 Journal of National University of Defense Technology
基金 国家863高技术资助项目(2003AA144050)
关键词 可生存技术 错误围堵 虚拟机器 网络安全设备 内核 survivability teehnlques fault containment virtual machine network security device kemel
  • 相关文献

参考文献11

  • 1Ammann P,Jajodia S,McCollum C D,et al.Surviving Information Warfare Attacks on Databases[A].Proc.IEEE Symposium on Research in Security and Privacy[C],Oakland CA,May,1997:164-174.
  • 2Ammann P,Jajodia S,Liu P.Recovery from Malicious Transactions[J].IEEE Transactions on Knowledge and Data Engineering,2002,15(2):1167-1185.
  • 3Anderson D G,Balakrishnan H,Kaashoek M F,et al.Resilient Overlay Networks[A].Proc.18th ACM Symposium on Operating Systems Principles[C],2001.
  • 4Castro M,Liskov B.Practical Byzantine Fault Tolerance[A].Proc.OSDI[C],1999.
  • 5Yves Deswarte,Laurent Blain,Jean-Charles Fabre,Intrusion Tolerance in Distributed Computing Systems[A].Proceedings of the IEEE Symposium on Research in Security and Privacy[C],Oakland CA,May,1991:110-121.
  • 6Liu P.Architectures for Intrusion Tolerant Database Systems[A].Proc.2002 Annual Computer Security Applications Conference[C],Dec.2002:311-320.
  • 7Jajodia S,McCollum C D,Liu P.Intrusion Confinement by Isolation in Information Systems[J].Journal of Computer Security,2000,8(4):243-279.
  • 8Karger P A,Zurko M E,Bonin D W,et al.A Retrospective on the VAX VMM security kerni[J].IEEE Transactions on software Engineering,1991,17(11):1147-1165.
  • 9VM Ware Inc.Vmware Virtual Platform[CP].Available:http://www.vmware.com/products/virtualplatform.html,May 2000.
  • 10Teodosiu D.End-to-end Fault Containment in Scalable Shared-memory Multiprocessors[D].Ph.D.Thesis,Stanford University,2000.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部