期刊文献+

入侵容忍系统的状态转移模型定量分析 被引量:3

Quantifying the State Transition Model of Intrusion Tolerance System
下载PDF
导出
摘要 对入侵容忍系统状态转移模型进行了改进,以此构建了半马尔可夫过程(SMP)模型,并用该模型计算了各状态的稳态概率.针对4类不同的攻击行为,运用SMP模型研究入侵容忍系统的可用性、完整性与机密性,定量评估入侵容忍系统的安全属性.比较分析了系统安全属性的数值结果,为在不同攻击行为下采取有效的容侵策略提供了依据. An improvement in the state transition model of intrusion tolerance system is proposed and a semi-Markov process (SMP) model is built. The steady-state probability of each state in the model is computed. In order to evaluate the security attributes quantitatively, the SMP model is used to study availability, integrity and confidentiality of intrusion tolerance system under four kinds of attacks. The numerical result is presented and analyzed. The results show that they are useful references to taking effective measures to tolerate the different attacks.
出处 《北京邮电大学学报》 EI CAS CSCD 北大核心 2008年第3期94-97,共4页 Journal of Beijing University of Posts and Telecommunications
基金 国家自然科学基金项目(60774091)
关键词 入侵容忍 状态转移 半马尔可夫过程 安全属性 intrusion tolerance state transition semi-Markov process security attribute
  • 相关文献

参考文献4

  • 1Jonsson E, Olovsson T. A quantitative model of the security intrusion process based on attacker behavior [J ]. IEEE Transactions on Software Engineering, 1997, 23 (4) : 1-11.
  • 2郭世泽,牛冠杰,郑康锋.入侵容忍系统模型构建及量化分析[J].北京邮电大学学报,2007,30(1):36-39. 被引量:14
  • 3Wang Feiyi, Gong Fengmin, Sargor C, et al. SITAR: a scalable intrusion-tolerant architecture for distributed services[ C ]//Proceedings of 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop. New York: IEEE Press, 2001:1-8.
  • 4Madan B B, Popstojanova K, Vaidyanathan K, et al. A method for modeling and quantifying the security attributes of intrusion tolerant system [ EB/OL]. 2004 [2007-09-17]. http://www. ee. duke. edu/- kst/security/Madan. pdf.

二级参考文献5

  • 1杨武,方滨兴,云晓春,张宏莉,胡铭曾.一种高性能分布式入侵检测系统的研究与实现[J].北京邮电大学学报,2004,27(4):83-86. 被引量:14
  • 2Fraga J S,Powell D.A fault-and intrusion-tolerant file system[C]∥Fraga J S.Proceedings of the 3rd International Conference on Computer Security.Oakland:[s.n.],1985:203-218.
  • 3Kyandoghere Kyamakya,Klaus Jobmann,Michel Mei~ncke.Security and survivability of distributed system[C]∥Bernstein.IEEE MILCOM 2000.Los Angeles:[s.n.],2000:179-190.
  • 4Yves Deswarte,Laurent Blain,Jean-Charles Fabre.Intrusion tolerance in distributed computing systems[C]∥ Klein B.Proceedings of the IEEE Symposium on Research in Security and Privacy.Oakland:[s.n.],1991:110-121.
  • 5曾志峰,杨义先.一种新的入侵监测恢复系统的设计与实现[J].北京邮电大学学报,2001,24(2):56-60. 被引量:9

共引文献13

同被引文献25

  • 1周旭,卢显良,侯孟书,吴劲.Research on Distributed Dynamic Replication Management Policy[J].Journal of Electronic Science and Technology of China,2005,3(2):97-102. 被引量:1
  • 2Wang Fei -yi,Gong Feng -min,Sargor C,et al.SITAR:A scalable intrusion-tolerant architecture for distributed services[C]//Proceedings of 2rid Annual IEEE Systems,Man,and Cybernetics Information Assurance Workshop.New York: IEEE Press, 2001 : 1-8.
  • 3Reynolds J C,Just J E,Lawson E,et al.The design and implementation of an intrusion tolerant system[C]//Proceedings of DSN 2002 International Conference on Dependable Systems and Networks, Washington, D C, USA, 2002: 285-292.
  • 4Littlewood B,Strigini L.Redundancy and diversity in security[C]// LNCS 3139,2004:423-438.
  • 5Littlewood B, Brocklehurst S, Fenton N, et al.Towards operational measures of computer securlty[J].Journal of Computer Security, 1993,2:211-229.
  • 6Eckhardt D E,Lee L D.A Theoretical basis for the analysis of muhiversion software subject to coincident error[J].IEEE Transactions on Software Engineering, 1985,12( 11 ) : 1511-1517.
  • 7Littlewood B,Miller D R.Conceptual modeling of coincident failures in multiversion software[J].IEEE Transactions on Software Engineering, 1989,12(15) : 1596-1614.
  • 8Popov P,Strigini L,May J,et al.Estimating bounds on the reliability of diverse systems[J].IEEE Transactions on Software Engineering, 2003,29 ( 4 ) : 345 -359.
  • 9KDD Cup 1999 Data[EB/OL].(1999-10-28).http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html.
  • 10CORREIA M, N'EVES N F, VERISSIMO E How to tolerate half less one byzantine nodes in practical distributed systems[C]//Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems. Florianpolis, Brazil: IEEE Press, 2004: 174-183.

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部