期刊文献+

容忍入侵的自适应安全通信系统模型与设计

Novel and Intrusion-tolerant Approach to Adaptive Secure Communication
下载PDF
导出
摘要 针对传统安全通信系统采用静态安全策略,缺乏容忍入侵能力和灵活性的问题,提出了一种多重驱动的容忍入侵自适应安全通信模型。能够根据系统当前安全态势及系统资源状态和系统配置变化、用户使用偏好等因素,动态自适应地调整每个会话的安全策略,增加系统的人为多样性和不可预测性,并实现性能和系统安全防护强度/容忍入侵能力等方面的最佳折衷。 Current secure communication systems apply a uniform and statically decided security policy to each session, which will be broke down when any security methods used in the policy is compromised. A novel approach to adaptive secure communication was proposed, in which the adaptive is driven by multi-sources, including threat, performance, etc. By using of redundancy and adaptation techniques, the secure communication system can dynamically reconfigure itself on per session basis, based on the awareness of system's current security situation, resources available, configuration, and the user's preference, thereby achieve a better tradeoff in system's security and performance.
出处 《系统仿真学报》 EI CAS CSCD 北大核心 2007年第12期2793-2797,共5页 Journal of System Simulation
基金 国家自然科学基金(60503012 60673071) 国家部委预研基金(9140A16040206JB52) 中国博士后科学基金(20060400252)
关键词 安全通信 自适应 容忍入侵 D—S证据推理 层次分析方法 secure communication adaptive intrusion tolerance D-S evidential reasoning analytic hierarchy process
  • 相关文献

参考文献7

  • 1Aura T,Gollmann D.Communications security on the internet[J].Software Focus (S1529-7942).2002,2(3):104-111.
  • 2Son SH,Zimmerman B,Hansson J.An Adaptable Security Manager for Real-Time Transactions[C]// Euromicro Conference on Real-Time Systems,Stockholm,Sweden,IEEE Computer Press,2000:63-70.
  • 3Schneck P A,Schwan K.Dynamic authentication for high-performance networked applications[C]// 6th International Workshop on Quality of Service (IWQoS '98),Los Alamitos:IEEE Computer Press,1998,127-136.
  • 4Tak S W,Park E K.Adaptive secure software architecture for electronic commerce[J].Software Practice and Experience (S0038-0644).2003,33(14):1343-1357.
  • 5Cukier M,et al.Providing Intrusion Tolerance With ITUA[C]// Supplement of the 2002 Int'l Conf.Dependable Systems and Networks (DSN),Washington,DC:IEEE Press,2002,C-5-1-C-5-3.
  • 6Glenn S.Perspectives on the Theory and Practice of Belief Functions[J].International Journal of Approximate Reasoning (S0888-613X).1992,6(3):445-480.
  • 7Saaty T L.The Analytic Hierarchy Process[M].New York,NY:McGraw-Hill.1980.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部