期刊文献+

基于拜占廷协议的容侵触发器研究及实现 被引量:1

Study and Implementation of Intrusion-tolerant Trigger based on Byzantine Protocol
下载PDF
导出
摘要 当信息系统存在入侵时,容忍入侵技术能够最大限度保障关键服务的运行。根据拜占廷协议和复制技术,设计出一种自适应容侵触发器,在节点和系统两个级别上实现入侵容忍,并研究攻击隔离和自动恢复技术,增强系统抵抗攻击的能力。实验结果表明,能够构建具有入侵容忍能力的连续服务系统,并能够在对响应时间要求不太严格但要求不间断运行的系统中得到应用。 Intrusion tolerance technologies can ensure essential services running to the full extent when system is intruded. Based on Byzantine protocol and replication technology, an adaptive intrusion-tolerant trigger is proposed, which can achieve intrusion tolerance in the node-level and system-level. Attack isolation and self-recovery technologies are researched to enhance the system automatically. Experimental results show that a continuous service system having capability of intrusion-tolerant can be constructed by the trigger. The trigger also can be applied to an uninterrupted running system without strict requirement of response time
出处 《电脑开发与应用》 2008年第3期40-42,共3页 Computer Development & Applications
基金 山西省2004年工业公关计划项目(041009)
关键词 容忍入侵 触发器 拜占廷协议 群组通信 复制技术 intrusion tolerance, trigger, Byzantine protocol, group communication, replication technology
  • 相关文献

参考文献6

  • 1FRAGA J S, POWELL D. A fault- and intrusion-tolerant file system [A]. Proceedings of the 3rd International Conference on Computer Security[C]. Ireland, 1985: 203-218.
  • 2闵应骅.网络容错与安全研究述评[J].计算机学报,2003,26(9):1035-1041. 被引量:12
  • 3Lamport Shostak R,Pesae M. The Byzantine generals problem-ACM [J]. Transaction on Programming Languages and Systems, 1982,4(3) : 382-401.
  • 4FELBER P. Replicating CORBA objects: a marriage between active and passive replication [A]. Proc of 2nd IFIP int'l Working Conf on DAIS-2,1999.
  • 5DEFAGO X. Agreement-related Problems: From Semi-passive Replication to Ordered Broadcast [A]. EPFL[C]. Lausanne, 2000.
  • 6景为平,徐晨,陈海进.AES密码算法的结构优化与实现[J].微电子学与计算机,2007,24(2):36-38. 被引量:13

二级参考文献25

  • 1闵应骅.容错计算二十五年[J].计算机学报,1995,18(12):930-943. 被引量:16
  • 2钱松,周钦,俞军.AES算法的一种高效FPGA实现方法[J].微电子学与计算机,2005,22(7):89-91. 被引量:8
  • 3Brown A, Patterson D. Toward availability benchmarks: A case study of software RAID systems. In:Proceedings of USENIX, San Diago, CA, 2000. http://www. cs. berkeley, edu/abrown/papers/usenix00/paper.html.
  • 4David Patterson. Recovery oriented computing. Presented at Princeton University, University of Illinois, and University of Michigan, November, 2002. http://roc. cs. berkeley. edu/talks/UIUC. ppt.
  • 5David Patterson et al. Recovery oriented computing (ROC):Motivation, definition, techniques, and case studies, http://roc. cs. berkeley.edu/papers/RO_TR02-1175. pdf.
  • 6Christian Cachin. Distributing trust on the Internet. In: Proceedings of the International Conference on Dependable Systems and Networks (DSN'01), 2001. 183-192.
  • 7Alvisi L, Malkhiy D, Piercez E, Reiterx M K, Wright R N.Dynamic byzantine quorum systems. In:Proceedings of the International Conference on Dependable Systems and Networks(DSN'00), New York, 2000. 283-293.
  • 8Anindo Banerjea. Simulation study of the capacity effects of dispersity routing for fault tolerant reahime channels. In: Proceedings of ACM SIGCOMM, Palo Alto, California, USA,1996. 194-205.
  • 9Paul Felldman F,Silvio Micah. Optimal algorithms for Byzantine agreement. In:Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, Chicago, USA, 1988.148-161.
  • 10Lamport L, Shostak R, Pease M. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 1982,4(3): 382-401.

共引文献23

同被引文献10

  • 1王欣洁,张福生,胡志勇.免疫原理在容侵系统中的应用[J].电脑开发与应用,2006,19(4):4-6. 被引量:2
  • 2李砚峰,刘泰康,李纪欣,胡志勇.一个Internet上的入侵容忍系统[J].太原理工大学学报,2006,37(2):161-164. 被引量:2
  • 3Zhou W. Detecting and Tolerating Failures in a Loosely Integrated Hetero-geneous Database System [J]. Computer Communication, 1999,22 (11): 1056- 1067.
  • 4Zhou W, Goseinski A. Fault2tolerant Servers for RHODOS System [J]. The Journal of Systems Software, 1997,37 (3) : 201-214.
  • 5Narendran B, Rangarajan S, Yajnik S. Data Distribution Algorithms for Load Balanced Fault2tolerant Web Access [M]. The Sixteenth Symposium on Reliable Distributed Systems, 1997: 97- 106.
  • 6Vaysburd A. Fault Tolerance in Three2tier Applications: Focusing on the Database Tier [C]. Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems, 1999: 322-327.
  • 7Fritzke U Jr., Ingels P. Transactions on Partially Replicated Data based on Reliable and Atomic Multicasts [C]. 21st International Conference on Distributed Computing Systems, 2001:284-291.
  • 8钱方,贾焰,黄杰,顾晓波,邹鹏.提高冗余服务性能的动态容错算法[J].软件学报,2001,12(6):928-935. 被引量:15
  • 9史殿习,吴泉源,王怀民,邹鹏.嵌套式动态容错协议的研究与设计[J].软件学报,2002,13(2):235-238. 被引量:4
  • 10周明辉,郭长国,吴泉源,贾焰.基于CORBA的容错对象复制算法[J].计算机研究与发展,2002,39(3):290-294. 被引量:11

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部