期刊文献+

环形结构的入侵容忍系统研究 被引量:1

Annular Architecture for the Intrusion-Tolerance System
下载PDF
导出
摘要 提出了一种环形的入侵容忍系统结构,并描述了数据一致性和服务器控制算法。当在线服务器数目大于两倍故障服务器数目时,该系统实现了服务数据的正确一致性,并通过动态调整在线服务器数目提高了系统的入侵容忍能力。仿真实验分析了在面临入侵情况下系统的可用性性能,并在实例中得出了该系统可用性较优的时间区间,为进一步提高系统的安全性和服务能力提供了一定的依据。 An annular architecture for the intrusion-tolerance system is presented. The data consistency algorithm and control algorithm for servers are described in detail. This system guarantees the data consistency when the total of servers online is more than twice the number of malicious servers, and the performance of intrusion-tolerance can be improved by adjusting the number of servers online dynamically. The system availability is illustrated in the simulation experiments and a time zone of higher availability is also presented.
出处 《电子科技大学学报》 EI CAS CSCD 北大核心 2010年第4期589-592,共4页 Journal of University of Electronic Science and Technology of China
基金 国家自然科学基金(60774091) 陕西省自然科学基金(SJ08F14)
关键词 环形结构 可用性 一致性 入侵容忍 网络安全 annular architecture availability consistency intrusion tolerance network security
  • 相关文献

参考文献12

  • 1周华,孟相如,杨茂繁,张立.入侵容忍系统的状态转移模型定量分析[J].北京邮电大学学报,2008,31(3):94-97. 被引量:3
  • 2CORREIA M, NEVES N F, LUNG L C. Byzantine-resistant consensus based on a novel approach to intrusion toleranee[C]//Fast Abstract in Supplement of the 10th Pacific Rim International Symposium on Dependable Computing. Tahiti, French: IEEE Press, 2004.
  • 3MONIZ H, N-EVES N F, CORREIA M. Randomized intrusion-tolerant asynchronous services[C]//DSN'06: Proceedings of the International Conference on Dependable Systems and Networks. Philadelphia, PA: ACM Press, 2006.
  • 4CORREIA M, VERISSIMO P, NEVES N E Thc design of a COTS real-time distributed security kcmcl (extended version) [R]. DI/FCUL TR-01-12. Portugal, 2001.
  • 5VERISSIMO P, CASIMIRO A. The timely computing base model and architecture[J]. IEEE Transactions on Computers, 2002, 51(8): 916-930.
  • 6CORREIA M, NEVES N F, LUNG L C, et al. Worm-IT--A wormhole-based intrusion-tolerant group communication system[I]. Journal of Systems and Software, 2007, 80(2): 178-197.
  • 7CORREIA M, N'EVES N F, VERISSIMO E How to tolerate half less one byzantine nodes in practical distributed systems[C]//Proceedings of the 23rd IEEE Symposium on Reliable Distributed Systems. Florianpolis, Brazil: IEEE Press, 2004: 174-183.
  • 8REITER M K. A secure group membership protocol[J]. IEEE Transactions on Sottware Engineering, 1996, 22(1): 31-42.
  • 9LUNG L C, CORREIA M, NEVES N E A simple intrusion-tolerant reliable multicast protocol using the TTCB[-EB/OL]. [2007-09-11]. http://www.di.fc.ul.pt/- nuno /PAPERS/SBRC03.pdf.
  • 10周旭,卢显良,侯孟书,吴劲.Research on Distributed Dynamic Replication Management Policy[J].Journal of Electronic Science and Technology of China,2005,3(2):97-102. 被引量:1

二级参考文献4

  • 1郭世泽,牛冠杰,郑康锋.入侵容忍系统模型构建及量化分析[J].北京邮电大学学报,2007,30(1):36-39. 被引量:14
  • 2Jonsson E, Olovsson T. A quantitative model of the security intrusion process based on attacker behavior [J ]. IEEE Transactions on Software Engineering, 1997, 23 (4) : 1-11.
  • 3Wang Feiyi, Gong Fengmin, Sargor C, et al. SITAR: a scalable intrusion-tolerant architecture for distributed services[ C ]//Proceedings of 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop. New York: IEEE Press, 2001:1-8.
  • 4Madan B B, Popstojanova K, Vaidyanathan K, et al. A method for modeling and quantifying the security attributes of intrusion tolerant system [ EB/OL]. 2004 [2007-09-17]. http://www. ee. duke. edu/- kst/security/Madan. pdf.

共引文献2

同被引文献4

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部