期刊文献+

一种入侵容忍系统的研究与实现 被引量:12

Research and implement on the intrusion tolerant system
下载PDF
导出
摘要 在信息系统存在入侵时,入侵容忍技术能够最大限度保障关键服务的运行。提出一种自适应容侵系统的体系结构,在节点和系统两个级别上实现入侵容忍,并研究攻击在线诊断及重定向技术,增强系统抵抗攻击的能力。实验结果表明,能够构建具有入侵容忍能力的连续服务系统,并能够在对响应时间要求不太严格但要求不间断运行的系统中得到应用。 Intrusion tolerance technologies guarantee systems provided essential services by the fullest extent when some intrusions sneak into them. Architecture of an intrusion-tolerant system was proposed and intrusion tolerance technologies in node-level and system-level were practiced. Online intrusion diagnosis and redirection technology were researched to harden the system automatically. Experiment results illuminate that system providing service continuously can be set up and applied in the condition that does not require response time strictly but demands continuous implementation.
作者 殷丽华 何松
出处 《通信学报》 EI CSCD 北大核心 2006年第2期131-136,共6页 Journal on Communications
基金 "十五"国防预研基金资助项目(41315.7.3)~~
关键词 入侵容忍 多样化冗余 选举机制 攻击诊断 intrusion tolerance diverse redundancy voting mechanism intrusion diagnosis
  • 相关文献

参考文献11

  • 1ALLEN J,CHRISTIE A,FITHEN W,et al.State of the Practice of Intrusion Detection Technologies[R].Carnegie Mellon,SEI,Technical Report,CMU/SEI-99-TR-028,2000.
  • 2JANSEN W,MELL P,KARYGIANNIS T,et al.Mobile agents in intrusion detection and response[A].12th Annual Canadian Information Technology Symposium[C].Canada,2000.
  • 3FRAGA J S,POWELL D.A fault-and intrusion-tolerant file system[A].Proceedings of the 3rd International Conference on Computer Security[C].Ireland,1985.203-218.
  • 4PAL P,WEBBER F,SCHANTZ R E,et al.Survival by defenseenabling[A].Proceedings of the New Security Paradigms Workshop (NSPW 2001)[C].USA,2001.
  • 5MOORE A.Attack Modeling for Information Security and Survivability[R].Technical Node No.CMU/SEI-2001-TN-001.Pittsburgh:CMU,2001.
  • 6WANG F,et al.SITAR:a scalable intrusion-tolerant architecture for distributed services[A].Proceedings of the 2001 IEEE Workshop on Information Assurance and Security US Military Academy[C].USA,2001.38-45.
  • 7REYNOLDS J,JUST J,LAWSON E,et al.The design and implementation of an intrusion tolerant system[A].Proceedings of the 2002 International Conference on Dependable Systems and Networks[C].USA,2002.285-292.
  • 8CUKIER M,LYONS J,PANDEY P,et al.Intrusion tolerance approaches in ITUA[A].Fast Abstract Supplement of the 2001 Intl Conf on Dependable Systems and Networks[C].Sweden,2001.
  • 9KUBIATOWICZ J,BINDEL D,CHEN Y,et al.OceanStore:an architecture for global-scale persistent storage[A].Proc Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2000)[C].USA,2000.
  • 10LIU P,JAJODIA S.Multi-phase damage confinement in database systems for intrusion tolerance[A].14th IEEE Computer Security Foundations Workshop (CSFW'01)[C].Canada,2001.

同被引文献75

引证文献12

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部