期刊文献+

基于非确定有穷自动机的网络入侵容忍系统研究 被引量:3

Research of Intrusion Tolerant System Based on Non-Derministic Finite Automaton Machine
下载PDF
导出
摘要 入侵容忍技术是继防火墙、存取控制、入侵检测技术之后的网络信息安全技术。当一个网络系统遭受非法入侵后,入侵容忍系统仍能及时自我诊断、恢复和重构,并能为合法用户提供所需的全部或者降级的服务。本文依据非确定性有穷自动机理论,模拟计算机受到攻击时入侵容忍系统的工作过程,为入侵容忍技术的发展提供了一种方法。 Intrusion Tolerant is a new technique of security of information and networking after fire wall,access control, and intrusion detection. In the network environment,an intrusion tolerant system is capable of self- diagnosing, recovering reconstruction and continuing to provide service to legitimate clients in the presence of intrusions. Based on non - deterministic finite automaton machine describes the working method while the computer is attacked and provides a way to develop intrusion tolerant technique.
出处 《现代电子技术》 2007年第3期65-67,70,共4页 Modern Electronics Technique
基金 湖北省自然科学基金(2005ABA238)资助
关键词 入侵容忍 有穷自动机 网络安全 非确定性 intrusion tolerant finite automaton machine network security non - deterministic
  • 相关文献

参考文献7

  • 1Fraga J S,Powell D A.Faultand Intrusion-Tolerant File System[C].Proceedings of the 3rd International Conference on Computer Security,1985:203-218
  • 2Gong Fungi,Goseva-Popstojanova K,Wang Feiyi,et al.Characterizing Intrusion Tolerant Systems using a State Transition Model[EB/OL].http://www.dependability.CS.virginia.edu/bibliography/darpa00.pdf,2002.
  • 3Deswarte Y,Blain L,Fabre J C.Intrusion Tolerance in Distributed Computing Systems[J].Proc of the International Symposium on Security and Privacy,IEEE Press,1991:110-121.
  • 4Cachin C,Poitz J.A Secure Intrusion-Tolerant Replication on the Internet Dependable Systems and Networks,2002.Proceedings.International Conference on 2002.
  • 5Liu Peng.Architectures for Intrusion Tolerant Database Systems Foundations of Intrusion Tolerant Systems,2003.
  • 6彭文灵,王丽娜,张焕国.基于有限自动机的网络入侵容忍系统研究[J].小型微型计算机系统,2005,26(8):1296-1300. 被引量:4
  • 7邹立新,丁建立.基于拜占庭协议的入侵容忍系统模型设计[J].计算机工程,2005,31(B07):88-90. 被引量:5

二级参考文献6

  • 1秦志光,刘锦德.安全系统的有限自动机[J].电子科技大学学报,1996,25(1):72-75. 被引量:7
  • 2Kihlstrom K P,Moser L E,Melliar-Smith P M.Solving Consensus in a Byzantine Environment Using an Unreliable Fault Detector.In:Proceedings of the International Conference on Principles of Distributed Systems (OPODIS),1997.
  • 3Gong Fungi,Goseva-Popstojanova K,Wang Feiyi,et al.Characterizing Intrusion Tolerant Systems Using a State Transition Model.http://dependability.cs.virginia.edu/bibliography/darpa00.pdf,2002.
  • 4Liu Peng.Architectures for Intrusion Tolerant Database Systems.In:2002 Annual Computer Security Applications Conference,2002-10:311-320.
  • 5Pal P,Webber P F,Schantz R E,et al.Intrusion Tolerant Systems.In:Proceedings of the IEEE Information Survivability Workshop (ISW-2000),Boston,MA,2000-10:24-26.
  • 6荆继武,冯登国.一种入侵容忍的CA方案[J].软件学报,2002,13(8):1417-1422. 被引量:65

共引文献6

同被引文献6

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部