期刊文献+

基于实时系统完整性控制机制构建Attack-Tolerant系统

Implementation of Attack-Tolerant System Based on on-the-Fly System Integrity Control Mechanism
下载PDF
导出
摘要 目前计算机安全领域的研究主要集中在入侵防御等方面,无法保证系统在受到攻击的状态下继续提供有效服务.提出了一种新的系统完整性控制机制,以及如何基于该机制构建Attack-Tolerant系统.实时系统完整性控制机制能够实时检测系统非正常改动并自动恢复,确保系统服务在受到攻击的状态下运作正常,保证了系统的机密性、有效性与完整性. Nowdays, security researches focus on intrusion-tolerant systems which are not conceived to be invulnerable, but rather to be able to withstand the impact of an attack and continue providing critical services despite ongoing attacks. A new system integrity control mechanism and how to implement attack-tolerant system based on it are presented in the paper. On-the-fly system integrity control mechanism detects unauthorized modifications and restores the system automatically as quickly as possible, ensures that system can continue providing critical services despite ongoing attacks, and keeps the integrity, availability and confidentiality of system successfully.
作者 李斐 王申康
出处 《江南大学学报(自然科学版)》 CAS 2006年第5期526-530,共5页 Joural of Jiangnan University (Natural Science Edition) 
关键词 系统完整性 攻击可容 LINUX内核模块 system integrity attack-tolerant Linux kernel module
  • 相关文献

参考文献8

  • 1Rami Lehti.Advanced intrusion detection evironment[EB/OL].(2004-05-10)[2004-07-08].http://www.cs.tut.fi/~rammer/aide/20040510.html.
  • 2Mark A.L6 file integrity[EB/OL].(2003-07-02)[2003-07-08].http://www.pgci.ca/l6/20030702.html.
  • 3Bioforge.Hiding loadable kernel modules for Linux 2.4[EB/OL].(2004-03-10)[2004-07-08].http://www.uq.net.au/~zzoklan/documents/hiding-modules-2.4.txt/20040310.html.
  • 4Menezes A J,Van Oorschot PC,Vanstone SA.Handbook of Applied Cryptography[M].New York:CRC Press,1996.
  • 5Wenbo Mao.Modern Cryptography:Theory and Practice[M],北京:电子工业出版社,2004.
  • 6Eric Rescorla.SSL and TLS:Designing And Building Secure Systems[M].北京:中国电力出版社,2002.
  • 7毛德操 胡希明.Linux内核源代码情景分析[M].杭州:浙江大学出版社,2001..
  • 8MosheBar 天宏工作室译.Linux文件系统[M].北京:清华大学出版社,2003..

共引文献201

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部