期刊文献+

基于概率的入侵容忍系统表决机制设计 被引量:2

Design of Intrusion Tolerant Voting Mechanism Based on Probability Strategy
下载PDF
导出
摘要 普通的大数表决算法不能区分一致正确的响应和一致错误的响应,导致错误输出和没有输出的问题。针对入侵容忍系统中输出结果准确性不高的问题,提出了一种应用概率理论作为额外信息的基于概率的入侵容忍表决机制。该机制根据没有出错的服务器产生的响应结果和出错服务器产生响应结果的概率计算出每个响应结果出现的概率,并根据最大可能性原则找出出现概率最大的那个响应结果,这个响应结果就是正确的输出。分析结果表明,该机制比普通的大数表决输出的结果更为准确,提高了系统的输出准确性。采用了冗余技术和多样性技术,系统即使在遭受到恶意攻击的情况下仍能安全、可靠地运行。 Traditional majority voting algorithm can not distinguish the coherent right response and coherent wrong response, and there will be wrong and no output situation. Current intrusion tolerant systems have some limits on accuracy. To solve this problem, a novel intrusion tolerant architecture with voting mechanism based on probability strategy is proposed. The probability of voting mechanism is based on the application of probability theory as an additional information. The mechanism is based on the probability of no- error servers responsing to results and the error servers responsing to results to calculate the probability of every results. It is based on maxirnum- like- hood principle to find the greatest probability of results ,which is correct output. Analysis shows that the mechanism based on probability strategy can vote more aconite output than traditional majority voting algorithm, so a more accurate system output will be improved. Both diversity, redundancy intrusion tolerance technology are used to build Web server system with intrusion tolerance properties. This system can provide correct and reliable services for the system continually despite the existence of fault or intrusion.
出处 《计算机技术与发展》 2010年第3期136-139,共4页 Computer Technology and Development
基金 湖南省科技计划基金资助项目(2006JT1040)
关键词 入侵容忍 冗余 表决 概率理论 最大可能性原则 intrusion-tolerance redundancy voter probability theory maximum-likehood principle
  • 相关文献

参考文献10

二级参考文献47

  • 1王丽娜 张焕国 傅建明.网络入侵容忍研究综述[A]..第三届中国信息和通信安全学术论文集[C].北京:科学出版社,2003.39-45.
  • 2李斓 冯登国.多级关系数据库中的RBAC[A]..第三届中国信息和通信安全学术论文集[C].北京:科学出版社,2003.329-333.
  • 3Y Deswarte, L Blain, J C Fabre. Intrusion tolerance in distributed computing systems [J] In Proc. of the International Symposium on Security and Privacy, Oakland (Ca.), IEEE press, May 20 - 22,1991.110- 121.
  • 4R Sandhu, P Samarati. Access control : principles and practice [J].IEEE Communications, 1994,32(9) :40 - 48.
  • 5M Lebkicher. Role Based Access Control[EB/OL]. http://www. giac.org/practical/GSEC/Michael_Lebkicher_GSEC. pdf, 2000.
  • 6R Sandhu, E Coyne, H Feinstein, et al. Role-based access control models[J]. IEEE Computer, Feb 1996,29(2) :38 - 47.
  • 7D Ferraiolo, R Sandhu, S Gavrila, et al. Proposed NIST Standard for Role-Based Access Control[J]. ACM Transactions on Information and System Security (TISSEC), Aug 2001,4(3) :224 - 274.
  • 8A Shamir. How to share a secret [J]. Communications of the ACM,1979,22( 11 ) :612 - 613.
  • 9Gong F M, Katerina G, Wang F Y, et al. Characterizing Intrusion Tolerant Systerm Using A State Transition Model [EB/OL]. http://www.ant.mcnc.org/projects/SITAR/papers/darpa00, pdf, 2001.
  • 10A Valdes, M Almgren,S Cheung,et al. An Adaptive Intrusion-Tolerant Server Architecture[EB/OL]. http://www.sdl.sri. com/users/valdes/DIT_arch.pdf, 2002.

共引文献59

同被引文献17

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部