期刊文献+

基于拦截器的容忍入侵中间件模型研究

Research of intrusion tolerance middleware model based on interceptor
下载PDF
导出
摘要 在分析当今具有容忍入侵功能的中间件模型的基础上,提出了具有容忍入侵功能特性的中间件设计的基本要求,给出了一种基于CORBA/J2EE架构的具有容忍入侵特性的中间件架构,并对其中的关键技术设计作了功能性的描述。该架构利用拦截器技术实现了服务与管理模块的分离,该架构具有透明、可扩展性好、配置灵活等特点。 Basic requirements of design for middleware with the feature ofintrusion tolerance is proposed based on the analysis of current middleware model with intrusion tolerance function, and a middleware structure with the feature of intrusion tolerance based on the CORBA/J2EE is given, and the key technical function used in the structure is described. Interceptor is used for the separation of the service module and management module. The structure has feature of transparence, scalability, flexible configuration and so on.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第24期6271-6274,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60503012) 国家863高技术研究发展计划基金项目(2007AA01Z405)
关键词 容忍入侵 中间件 拦截器 框架 容侵服务 intrusion tolerance middleware interceptor framework intrusion tolerance service
  • 相关文献

参考文献8

  • 1GangShin Lee, Chaetae Im. SITIS: Scalable intrusion tolerance middleware for internet service survivability[C].Springer Berlin/ Heidelberg Advances in Multimedia Information Processing- PCM,2004:564-571.
  • 2Manish Rathi,Faroop Anjum.Investigation of intrusion tolerance for COTS middleware[C].IEEE International Conference,2002: 1169-1173.
  • 3Zbib R, Ghosh A,Anjum F, et al.Intrusion tolerance in distributed middleware [J]. Information Systems Frontiers Journal, 2004,6 (1):67-75.
  • 4王全玉,闫波,李凤霞,战守义.基于动态代理提高RMI应用的伸缩性[J].计算机工程与应用,2004,40(12):94-95. 被引量:2
  • 5Blair GS,Coulson G.The case for reflective middleware:Building middleware that is flexible,reconfigurable and yet simple to use[J].Communications of the ACM,2002,45(6):33-38.
  • 6Rod Johnson.J2EE设计开发编程指南[M].魏海萍,译.北京:电子工业出版社,2002:98-99.
  • 7胡文,黄皓.自动入侵响应技术研究[J].计算机工程,2005,31(18):143-145. 被引量:6
  • 8Carver C A,Hill JMD,Surdu J R, et al.A methodology for using intelligent agents to provide automated intrusion response [C]. Proceedings of the IEEE Systems,Man,and Cybernetics Information Assurance and Security Workshop.New York:West Point, 2000.

二级参考文献10

  • 1Eric Gramma Richard Heml Ralph Johnson et al.设计模式[M].北京:机械工业出版社,2000..
  • 2Poynter I, Doctor B. Beyond the Firewall: The Next Level of Network Security. http://www.latis.com/papers_briefs/ , 2003-01
  • 3Cohen F. Simulating Cyber Attacks, Defenses, and Consequences. http://all.net/journal/ntb/simulate/simulate.html, 1999-03
  • 4Carver Jr. C A. Intrusion Response Systems: A Survey. http://faculty.cs.tamu.edu/pooch/course/CPSC665/Spring2001/Lessons/Intrusion_Detection_and_Response/rtirs2.doc,2001
  • 5Papadaki M, Furnell S, Dowland P. Enhancing Intrusion Response in Networked Systems. http://ted.see.plym.ac.uk/nrg/presentations/House_of_Commons_2002.pdf, 2002-12
  • 6Papadaki M, Furnell S, Dowland P, et al. Enhancing Intrusion Response in Networked Systems. http://ted.see.plym.ac.uk/nrg/presentations/House_of_Commons_2002
  • 7Carver Jr C A, Pooch U. An Intrusion Response Taxonomy and Its Role in Automatic Intrusion Response[C]. IEEE Systems,Man,and Cybernetics Information Assurance and Security Workshop, New York: West Point, 2000
  • 8Toth T, Kruegel C. Evaluating the Impact of Automated Intrusion Response Mechanisms. In: 18^th Annual Computer Security Applications Conference (ACSAC'02), 2002
  • 9Lee W, Fan W, Miller M, et al. Toward Cost-sensitive Modeling for Intrusion Detection and Response[C]. In: 1^st ACM Workshop on Intrusion Detection Systems, 2000
  • 10Geib C W, Goldman R P. Plan Recognition in Intrusion Detection Systems. In: DARPA Information Survivability Conference & Exposition Ⅱ, 2001

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部