期刊文献+

基于免疫安全存储设备IBSSD的研究与实现 被引量:4

IBSSD:Immune Based Secure Storage Device
下载PDF
导出
摘要 基于智能磁盘的安全存储设备是当前安全存储系统研究的热点问题。为解决现有安全存储设备I/O性能低的问题,引入人工免疫算法,实现高效的访问控制模块。首先给出基于免疫安全存储设备的结构,以及基于免疫访问控制模块中主要元素的定义,针对存储设备的特点,设计了差异选择算法和混合检测算法。实现了基于免疫访问控制的原型系统,验证了系统能高效地识别非法数据访问请求。修改开源存储区域网系统-Lustre中智能磁盘模块的代码,构建基于免疫安全存储设备的原型系统,测试了I/O性能。结果验证了基于免疫安全存储设备的I/O损失较小,能构成较高性能的安全存储系统。 The secure storage device is a hot topic in current secure storage system researching. In order to improve the I/O performance of current secure storage device,we used artificial immune algorithm to research efficient access control system for it. The structure of immune based secure storage device and some definitions of element in immune based access control system were given. By analyzing the characters of secure storage device,we presented diversity selection algorithm and mixed checking algorithm. Realizing the prototype of immune based access control system and testing the efficiency of it, the result shows it can inspect illegal access request efficiently. Realizing the prototype of immune based secure storage device in Lustre and evaluating its I/O performance. The result proves that the immune based secure storage device has high I/O performance and can be used for efficient secure storage system.
出处 《计算机科学》 CSCD 北大核心 2009年第1期101-104,137,共5页 Computer Science
基金 国家自然科学基金(No.60573046) 江苏省自然科学基金(No.BK2007086)的资助
关键词 存储安全系统 安全存储设备 人工免疫算法 Secure storage, Secure storage device, Artificial immune algorithm
  • 相关文献

参考文献22

  • 1Gibson G A, Van Meter R. Network Attached Storage Architecture. Communications of the ACM, 2000,43 (11)
  • 2Amiri K S. Scalable and Manageable Storage Systems. Ph. D. Dissertation, CMU-CS-00-178. Carnegie Mellon, December 2000
  • 3Gobioff H. Security for a High Performance Commodity Storage Subsystem. Ph.D. Dissertation, CMU-CS-99-160. Carnegie Mellon,July 1999
  • 4Amiri K , Gibson G A , Golding R. Highly Concurrent Shared Storage//Proceedings of the International Conference on Distributed Computing Systems. Taipei, April 2000
  • 5Gobioff H, Nagle D,Gibson G. Embedded Security for Network- Attached Storage. technical report CMU-CS-99-154. CMU SCS, June 1999
  • 6Gobioff H,Gibson G, Tygar D. Security for Network Attached Storage Devices. technical report, CMU-CS-97-185. CMU SCS, 1997
  • 7GoodsonG R, Wylie J J, Ganger G R, et al. The Safety and Liveness Properties of a Protocol Family for Versatile Survivable Storage Infrastructures. Technical Report CMU-PDL-03-105. Carnegie Mellon University Parallel Data Laboratory, March 2004
  • 8Pennington A, Strunk J, Griffin J, et al. Storage-based Intrusion Detection.. Watching Storage Activity For Suspicious Behavior// 12th USENIX Security Symposium. Washington, D. C. , Aug. 2003
  • 9Soules C A N, Goodson G R, Strunk J D, et al. Metadata Efficiency in Versioning File Systems//2nd USENIX Conference on File and Storage Technologies. San Francisco, CA mar 31-Apr 2,2003
  • 10Strunk J D,Goodson G R, Pennington A G, et al. Intrusion Detection, Diagnosis, and Recovery with Self-Securing Storage. Technical Report, CMU-CS-02-140. CMU SCS, May 2002

二级参考文献11

  • 1龙振洲.医学免疫学[M].北京:人民卫生出版社,1995..
  • 2Forrest S., Hofmeyr S.A.. Immunology as information processing. In: Segel L.A., Cohen I. eds.. Design Principles for the Immune System and Other Distributed Autonomous Systems. New York: Oxford University Press, 2000, 361~387.
  • 3Hofmeyr S.A., Forrest S.. Immunity by design: An artificial immune system. In: Proceedings of the Genetic and Evolutionary Computation Conference,San Francisco,CA,1999,1289~1296.
  • 4Forrest S., Hofmeyr S.A., Somayaji A., Longstaff T.A.. A sense of self for unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, 1996, 120~128.
  • 5Forrest S., Perelson A.S., Allen L., Cherukuri R.. Self-nonself discrimination in a computer. In: Proceedings of the 1994 IEEE Symposium on Security and Privacy, Los Alamitos, CA, 1994, 202~212.
  • 6D'haesseleer P., Forrest S.. An immunological approch to change detection algorithms analysis and implications. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA, 1996, 110~119.
  • 7D'haesseleer P.. Further efficient algorithms for generating antibody string. The University of New Mexico, Albuquerque, NM: Technical Report CS95-03, 1995.
  • 8Percus J.K., Percus O., Perelson A.S.. Probability of self-nonself discrimination. In: Perelson A.S., Weisbuch G. eds.. Theoretical and Experimental Insights into Immunology. New York: Springer-Verlag Press, 1993, 63~70.
  • 9Percus J.K., Percus O., Perelson A.S.. Predicting the size of the antibody-combining region from considering of efficient self/nonself discrimination. In: Proceedings of the National Academy of Science, Washington, 1993, 1691~1695.
  • 10Hofmeyr S.A.. An immunological model of distributed detection and its application to computer security[Ph.D. dissertation]. University of New Mexico, Albuquerque, NM, 1999.

共引文献42

同被引文献51

  • 1唐莞菁,汪卫,王智慧,周皓峰,施伯乐.一种多级安全数据模型中的多实例语义[J].计算机研究与发展,2007,44(z3):238-243. 被引量:3
  • 2万绪江.职工教育管理系统[J].气象与环境学报,1992,18(4):42-43. 被引量:1
  • 3孙照焱,董永贵,贾惠波,冯冠平.附网存储设备用户行为的一种层次化免疫策略[J].计算机应用研究,2005,22(1):111-113. 被引量:1
  • 4Axelsson S. Research in intrusion-detection systems: a survey[ R]. Technical Report 98-17. Department of Computer Engineering, Chalrners University of Technology, December 1998.
  • 5NFR Security[ EB/OL]. http://www. nfr. net/. August 2002.
  • 6Forrcst S, Hofmeyr S A, Somayaji A,et al. Longstaff. a sense of self for UNIX processes [ C ]. IEEE Symposium on Security and Privacy, IEEE, 1996,120-128.
  • 7Scambray J, McClure S, Kurtz G. Hacking exposed: network security secrets &solutions[ M]. Osborne/McGraw- Hill, 2001.
  • 8Knight T,Timmis J A. A multi-layered immune inspired approach to data mining[C]. In Proceedings of the 4th International Conference on Recent Advances in Soft Computing ,2002,266-271.
  • 9Bradley D,Tyrrell A. Immunotronics: hardware fault tolerance inspired by the immune system[C]. In Proceedings of the 3rd International Conference on Evoluable Systems (ICES 2000), 1801, 11-20.
  • 10Dasgupta D, Yu S, Majumdar N S. MILA multilevel immune learning algorithm[C]. In Proceedings of the Genetic and Evolutionary Computation Conference ( GECCO 03 ), LNCS 2723, 2003,183- 194.

引证文献4

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部