期刊文献+

入侵容忍综述 被引量:8

Status of Intrusion Tolerance
下载PDF
导出
摘要 针对在大规模复杂网络环境下保证信息安全问题,阐述了入侵容忍的概念和相关理论,并对入侵容忍的发展现状、应用领域进行研究和分析,最后讨论该领域当前存在的问题和未来的发展方向。研究结果表明,入侵容忍作为第三代信息安全技术的核心,能有效地预防、阻止入侵,发展前景广阔。 In order to ensure the security of the information under the environment of complex network, intrusion tolerance is a good completement and the central issue of network security in recent years. The related theory of intrusion tolerance is illustrated, then the status and related application of intrusion tolerance are studied, at last the problems and future of intrusion tolerance are discussed. As the core of the 3rd generation information security, intrusion tolerance can prevent the intrusion effectively, it has a wide prospect.
出处 《吉林大学学报(信息科学版)》 CAS 2009年第4期389-395,共7页 Journal of Jilin University(Information Science Edition)
基金 国家自然基金资助项目(60873235) 教育部新世纪优秀人才支持计划基金资助项目(NCET-06-0300) 吉林省科技支撑计划重点基金资助项目(20080318) 吉林大学研究生"985工程"创新计划基金资助项目(20080244)
关键词 入侵容忍 容错 网络安全 intrusion-tolerance fault-tolerance network-security
  • 相关文献

参考文献26

  • 1PAL P, WEBBER F, SCHANTZ R E, et al. Intrusion Tolerant Systems [ C ] //Proceedings of the IEEE Information Survivability Workshop (ISW-2000). Boston, Massachusetts: [ s. n. ], 2000: 24-26.
  • 2PAULO ESTEVES VERISSIM, NUNO FERREIRA NEVES, MIGUEL PUPO CORREIA. Intrusion-Tolerant Architectures: Concepts and Design [ C] //Architecting Dependable Systems. [ S.l. ]: Springer-Verlag, 2003: 3-36.
  • 3MICHAEL E WHITMAN,HERBERT J MATTORD.信息安全原理[M].第2版.北京:清华大学出版社,2006.
  • 4JAYNARAYAN H LALA. Intrusion Tolerant Systems [ C ] //Presentation on 2000 Pacific Rim International Symposium on Dependable Computing. Los Angeles, California: [s. n. ], 2000: 3.
  • 5PAULO SOUSA, ALYSSON NEVES BESSANI, MIGUEL CORREIA, et al. Resilient Intrusion Tolerance through Proactive and Reactive Recovery [ C] //Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing. Washington, DC, USA: IEEE Computer Society, 2007: 373-380.
  • 6DR FEIYI WANG, GONG FENGMIN, SARGOR C. SITAR: A Scalable Intrusion Tolerant Architecture for Distributed Services [ C] //Proceedings of 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop. New York: IEEE Press, 2001 : 1-8.
  • 7DAZHI WANG, BHARAT B MADAN, KISHOR S TRIVEDI. Security Analysis of SITAR Intrusion Tolerance System [ C ] //Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems: in Association with 10th ACM Conference on Computer and Communications Security 2003. New York, NY, USA: ACM, 2003 : 23-32.
  • 8WANG Xi, GUO Zhen-yu, LIU Xue-zeng, et al. Hang Analysis: Fighting Responsiveness Bugs [ C] //Proceedings of the 3rd ACM SIGOPS/European Conference on Computer Systems 2008. New York, NY, USA: ACM, 2008: 177-190.
  • 9ALYSSON NEVES BESSANI, EDUARDO PELISON ALCHIERI, MIGUEL CORREIA, et al. DepSpace: A Byzantine Fault- Tolerant Coordination Service [ C ]//Proceedings of the 3rd ACM SIGOPS/European Conference on Computer Systems 2008. New York, NY, USA: ACM, 2008: 163-176.
  • 10DUTCH T MEYER, GITIKA AGGARWAL, BRENDAN CULLY, et al. Parallax: Virtual Disks for Virtual Machines [ C] //Proceedings of the 3rd ACM SIGOPS/European Conference on Computer Systems 2008. New York, NY, USA: ACM, 2008: 41-54.

二级参考文献84

共引文献138

同被引文献55

引证文献8

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部