期刊文献+

关于入侵容忍技术的研究

下载PDF
导出
摘要 入侵容忍技术在认同安全问题不可避免性的前提下,主要研究如何在被攻击时系统仍能保证正常运行。本文介绍了网络环境下的容忍入侵系统的相关概念与技术,同时分析了实现入侵容忍的两种途径。容忍入侵技术已成为网络安全技术的发展新方向。
出处 《网络与信息》 2010年第4期36-36,共1页 Network & Information
  • 相关文献

参考文献3

二级参考文献28

  • 1穆成坡,黄厚宽,田盛丰.入侵检测系统报警信息聚合与关联技术研究综述[J].计算机研究与发展,2006,43(1):1-8. 被引量:70
  • 2Leonard J. Lapadula State of the Art in Anomaly Detection and Reaction:[Technical report]. MITRE, Bedford, Massachusetts,1999
  • 3Jajodia S, Ammann P, McCollum C D. Surviving information warfare attacks. IEEE Computer, 1999,32(4): 57-63
  • 4Anderson R H. Research and Development Initiatives Focused on Preventing, Detecting, and Responding to Insider Misuse of Critical Defense Information Systems: Results of a Three-Day Workshop. RAND CF-151-OSD, 1999
  • 5Insider Threat Integrated Process Team, Department of Defense (DoD-IPT), 2000. Available at http://www. c3i. osd. mil
  • 6DoD Insider Threat Mitigation. U.S. Department of Defense,2000. Available at http://www. c3i. osd. mil
  • 7Lee P A,Anderson T. Fault Tolerance: Principles and Practice.Springer-Verlag, Wien, Austria, second edition, 1990
  • 8Bernstein P A, Hadzilacos V,Goodman N. Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading,MA, 1987
  • 9Gray J, Reuter A. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, San Mateo, CA,1993
  • 10Weikum G, Vossen G. Transactional Information Systems:Theory, Algorithms, and the Practice of Concurrency Control and Recovery. Morgan Kaufmann Publishers, 2001

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部