期刊文献+

入侵容忍实时数据库的半马尔可夫生存能力评价模型 被引量:6

A Semi-Markov Evaluation Model for the Survivability of Real-Time Database with Intrusion Tolerance
下载PDF
导出
摘要 针对事务和数据的实时特性,给出了具有入侵容忍能力的实时数据库系统的体系架构.基于实时性的要求和入侵检测存在的延迟,提出了半马尔可夫评价模型,对实时数据库在入侵容忍条件下的生存能力进行评价,并根据此模型给出相关的量化准则,定义了完整性与可用性等生存性指标,对实时数据库的生存能力进行了验证.由于误报、检出率和攻击强度等因素会对生存能力造成重大影响,因此利用TPC-C基准测试对其进行了详细的数据分析.实验表明,该模型能较准确地预测实时数据库的行为,所提出的入侵容忍实时数据库在面临攻击时,其基本生存能力没有受到严重的影响. Based on the real-time features of transactions and data,an intrusion tolerant architecture is proposed for the real-time database system.Considering real-time parameters and intrusion detection latency,Semi-Markov evaluation model is established to access the survivability of real-time database.Based on this model,relevant quantitative criteria are given to define the indicators of the survivability,such as integrity and availability,so as to validate the survivability of real-time database.Because the factors such as false alarm,detection rate and the intensity of attacks have important effects on the survivability,they are analyzed by the TPC-C benchmark in detail.Experiments show that the model can accurately predict the behaviors of real-time database.The proposed real-time database with intrusion tolerance can still keep the basic survival when facing attacks.
出处 《计算机学报》 EI CSCD 北大核心 2011年第10期1907-1916,共10页 Chinese Journal of Computers
基金 中央高校基本科研业务费专项资金(2010MS061)资助~~
关键词 入侵容忍 实时数据库 生存性 评价模型 intrusion tolerance real-time database survivability evaluation model
  • 相关文献

参考文献19

  • 1Wang Hai, Liu P. Modeling and evaluating the survivability of an intrusion tolerant database system. Computer Security- ESORICS, 2006:207 224.
  • 2Wang H, Liu P. A semi Markov survivability evaluation model for intrusion tolerant database systems//Proceedings of the International Conference on Availability, Reliability and Security. Poland, 2010:104-111.
  • 3TPC. TPC-C Benchmark. http://www, tpc. org/tpcc/, 2010.
  • 4Ellison R J, Fisher D A et al. Survivability: Protecting your critical systems. IEEE Internet Computing, 1999, 3(6): 55-63.
  • 5侯读杰.混源油气运移方向的地球化学识别[J].石油大学学报(自然科学版),2000,24(4):87-90. 被引量:14
  • 6Nicol D M, Sanders W H, Trivedi K S. Model-based evaluation: From dependability to security. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 48-65.
  • 7Madan B Bet al. A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 2004, 56(4): 167-186.
  • 8黄荣辉 叶大年.高等地球化学[M].北京:科学出版社,2000.332-371.
  • 9Singh S, Cukier M, Sanders W H. Probabilistie validation of an intrusion-tolerant replication system//Proceedings of the DSN. California, 2003:615-624.
  • 10Czochanska Z,Shoppard C M.Organic geochemistry of sediments in New Zealand,Part I:A biomarker study of the petroleum seepage at the geothermal region of Waiotapu [ J ].Geochim Cosmochim Acta,1986,50:507-515.

二级参考文献36

  • 1郑吉平,秦小麟,钟勇,孙瑾.基于SPN模型的可生存性DBMS中恶意事务修复算法的研究[J].计算机学报,2006,29(8):1480-1486. 被引量:11
  • 2Bai K,Liu P.A data damage tracking quarantine and recovery(DTQR)scheme for mission-critical database systems[C] //Kuznetsov S.Proceedings of 12th International Conference on Extending Database Technology.Saint Petersburg,Russia:ACM Press,2009:720-731.
  • 3Chiueh T,Bajpai S.Accurate and efficient inter-transaction dependency tracking[C] //Cilia M.Proceedings of24th International Conference on Data Engineering.Cancun,Mexico:IEEE Computer Society Press,2008:1209-1218.
  • 4Lin P,Wang H,Li L.Real-time data attack isolation for commercial database applications[J].Journal of Network and Computer Applications,2006,29(4):294-320.
  • 5Ammann P,Jajodia S,McCollum C D.Surviving information warfare attacks on databases[C] //Storms C.Proceedings of IEEE Symposium on Security and Privacy.Oakland,USA:IEEE Computer Society Press,1997:164-174.
  • 6Ammann P,Jajodia S,Liu P.Recovery from malicious transactions[J].IEEE Transactions on Knowledge and Data Engineering,2002,14(5):1167-1185.
  • 7Bai K,Yu M,Liu P.Zero-down-time database damage tracking,quarantine,and cleansing with negligible run time overhead[C] //Jajodia S,Lopez J.Proceedings of13th European Symposium on Research in Computer Security.Málaga,Spain:Springer Press,2008:161-176.
  • 8Zhu H,Fu,G,Zhu Y,et al.Dynamic data recovery for database systems based on fine grained transaction log[C] //Bernardino J,Desai B C.Proceedings of 12th International Symposium on Database Engineering and Applications.Coimbra,Portugal:ACM Press,2008:249-253.
  • 9Liu P,Jajodia S,McCollum C D.Intrusion confinement by isolation in information systems[J].Journal of Computer Security,2000,8(4):243-279.
  • 10Liu P,Jajodia S.Multi-phase damage confinement in database systems for intrusion tolerance[C] //Young D C.Proceedings of 14th IEEE Workshop on Computer Security Foundations.Cape Breton,Novia Scotia,Canada:IEEE Computer Society Press,2001:191-204.

共引文献25

同被引文献50

引证文献6

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部