期刊文献+

面向服务的分布式数据库系统的容忍入侵方法

Intrusion-tolerant Method Based on Service-oriented Distributed Database System
下载PDF
导出
摘要 以分布式数据库系统提供的服务作为入侵检测的对象,采用了基于对可观测现象检测的原理,跟踪和定位被入侵的服务,借鉴了基于日志的破坏隔离围堵策略,准确定位了被破坏的数据,并对这些数据进行处理和恢复,不需要将整个系统进行"回退",最大限度地保证数据库中其他服务的正常运行,保证了系统的可生存性。 This paper presents the design of service-oriented intrusion-tolerant in distributed database systems, which detects intruded services by watching observable effects. After that it carries on damage containment policy, locating and cleaning corrupted data, which ensures that other services can work normally in spite of the systems being intruded, guaranteeing their survivability.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第17期178-180,186,共4页 Computer Engineering
基金 国家自然科学基金(60503012) 国家部委预研基金(9140A16040206JB5204)
关键词 分布式数据库系统 容忍入侵 破坏隔离 distributed database system intrusion-tolerant damage containment
  • 相关文献

参考文献7

  • 1Barbara D,Goel R,Jajodia S.Using Checksums to Detect Data Corruption[C]//Proceedings of the 2000 International Conference on Extending Data Base Technology.2000.
  • 2Jaynarayan H L.Organically Assured and Survivable Information Systems[EB/OL].(2003-05).http:www.darpa..mil/ipto/programs/ oasis.
  • 3Pal P,Webber F,Schantz R,et al.Intrusion Tolerant Systems[C]//Proc.of IEEE Information Survivability Workshop.2000.
  • 4Ammann P,Jajodia S,Liu P.Recovery from Malicious Transac-tions[C]//Proc.of IEEE Transactions on Knowledge and Data Engineering.2002-09.
  • 5Carver C,Pooch U.An Intrusion Response Taxonomy and Its Role in Automatic Intrusion Response[C]//Proceedings of IEEE Workshop on Information Assurance and Security.2000.
  • 6Ammann P,Jajodia S,McCollum C D,et al.Surviving Information Warfare Attacks on Databases[C]//Proc.of the IEEE Symposium on Security and Privacy.1997:164-174.
  • 7Jajodia S,McCollum C D,Ammann P.Trusted Recovery[J].Comm-unications of the ACM,1999,42(7):71-75.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部