期刊文献+

一种基于CORBA分布式对象的容侵恢复策略 被引量:3

Heterogeneous Recovery Strategy Based on CORBA for Intrusion Tolerant Distributed Object System
下载PDF
导出
摘要 基于分布式对象容忍入侵系统的研究是入侵容忍的研究热点之一。国内外对分布式对象容忍入侵系统架构方面已做了一定的研究,但均未侧重于系统中对象恢复策略。该文在研究SITAR模型的基础上提出了一种基于CORBA中间件分布式对象容忍入侵系统的模型,在该模型下提出了分布式对象的对象恢复策略,和传统恢复策略相比,该恢复后的对象对原来的入侵攻击在某种程度上有一定的免疫力。通过一个实例验证了恢复策略,结果表明它可使对象向前恢复到正确结果。 Distributed object based intrusion tolerant system (ITDOS) has become one of the attractive issues on intrusion tolerance. There have been many significant researches on the model of a heterogeneous intrusion tolerant distributed object system, but few of them focus on distributed object recovery strategy. This paper presents a model of ITDOS based on middleware, CORBA, which is based on the researches of the SITAR model, and presents a recovery strategy for ITDOS in this model. The objects, recovered by the recovery strategy, can resist the attack of the last to some extent. It is validated by experiment that the strategy correctly performs forward recovery.
出处 《计算机工程》 EI CAS CSCD 北大核心 2006年第20期138-139,165,共3页 Computer Engineering
基金 国家自然科学基金资助项目(60273075)
关键词 入侵容忍 分布式对象容忍入侵系统 恢复策略 CORBA Intrusion tolerance Intrusion tolerant distributed object system Recovery strategy CORBA
  • 相关文献

参考文献5

  • 1Deswarte Y,Blain L,Fabre J C.Intrusion Tolerance in Distributed Computing Systems[C].Proc.of the International Symposium on Security and Privacy,Oakland,CA.IEEE Press,1991.
  • 2Wang Dazhi,Madan B B,Trivedi K S.Security Analysis of SITAR Intrusion Tolerance System[C].Proc.of SSRS '03,Fairfax,Virginia,USA,2003-10-31.
  • 3OMG.The Common Object Request Broker:Architecture and Specification(Revision 2.5)[Z].2001.
  • 4Castro M,Liskov B.Proactive Recovery in a Byzantine-fault-tolerant System[C].Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation,2000-10.
  • 5Cachin C,Kursawe K,Shoup V.Random Oracles in Constantinople:Practical Asynchronous Byzantine Agreement Using Cryptography[C].Proceedings of the 19th ACM Symposium on Principles of Distributed Computing,2000:123-132.

同被引文献14

  • 1郭渊博,马建峰.容忍入侵的国内外研究现状及所存在的问题分析[J].信息安全与通信保密,2005(7):337-341. 被引量:16
  • 2贾超,薛继华.基于容忍技术的入侵检测系统研究[J].微处理机,2006,27(3):41-43. 被引量:3
  • 3Michael Grottke,Member, Lei Li,et al.Analysis of software aging in a web server [J]. IEEE Transactions on Reliability, 2006,55:411-420.
  • 4郭渊博,王亚弟,袁顺,等.基于J2EE中间件规范的容忍入侵应用服务器及容忍入侵方法[P].200710019118.9,2007-11-20.
  • 5Scott S.JBoss administration and development third edition[M]. JBoss Group,LLC,2003.
  • 6Paulo Sousa, Alysson N Bessani, Wagner S Dantas, et al.Intrusion-tolerant self-healing devices for critical infrastructure protection [C]. Proceedings of the 39th IEEE International, 2009: 374-380.
  • 7Huang Y, Kintala C, Koletis N, et al. Software Rejuvenation: Analysis, Module and Applications[C]//Proc. 25th IEEE on Fault Tolerant Computing. CA: Los Alamitos, 1995 : 381-390.
  • 8Scott S. JBoss Administration and Development(Third Fxlition) [M]. JBoss Group, LLC, 2003.
  • 9Sousa P, Bessani A N, Dantas W S, et al. Intrusion-Tolerant Self-Healing Devices for Critical Infrastructure Protection[C]// Proceedings of the 39th IEEE International. 2009:374-380.
  • 10曹军梅,许静荣.基于冗余技术入侵容忍系统的设计与实现[J].延安大学学报(自然科学版),2007,26(3):17-19. 被引量:1

引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部