期刊文献+

基于排队网的入侵响应系统可生存性 被引量:4

Survivability analysis of intrusion response system based on queuing nets
原文传递
导出
摘要 入侵响应是提高系统可生存性的主要措施,入侵响应系统自身的生存能力至关重要。提出了一个基于排队网的入侵响应系统生存性分析模型,并将其转化为对应的二维Markov模型,通过拟生灭过程(QBD)的构造实现了模型的化简,使用频谱扩展法求出了模型的稳态概率分布。最后,在此基础上分别从阻塞概率和平均队长2个方面来量化入侵响应系统的可生存性。量化结果不仅可以用来检验系统的设计是否符合生存性要求,也可为系统结构和系统参数的优化调整提供依据。 Intrusion response is a key measure of system survivability and the survivability of intrusion response system is critical.A survivability analysis model was developed using queuing nets transformed into a two-dimension Markov model and simplified into a quasi birth and death(QBD) process.The steady-state distribution is obtained based on the spectral expansion method.The blocking probability and the mean queue length of the intrusion response model are calculated to quantify the survivability of the intrusion response system.The results are useful not only for determining whether the survivability requirements are satisfied but also for optimizing the system structure and parameters.
出处 《清华大学学报(自然科学版)》 EI CAS CSCD 北大核心 2012年第10期1507-1512,共6页 Journal of Tsinghua University(Science and Technology)
基金 国家自然科学基金重大项目资助(90818021)
关键词 入侵响应 可生存性 排队网 拟生灭过程(QBD) 频谱扩展 intrusion response survivability queuing nets quasi birth and death process(QBD) spectral expansion
  • 相关文献

参考文献1

二级参考文献19

  • 1ZHUJianming,WANGChao,MAJianfeng.Intrusion-Tolerant Based Survivable Model of Database System[J].Chinese Journal of Electronics,2005,14(3):481-484. 被引量:3
  • 2B A Hollway, P G Neumann. Survivable computer-communication systems; The problem and working group recommendations[ R ]. Washington;US Army Research Laboratory, 1993.
  • 3R J Ellison, B D Fisher, R Linger, et al. Survivable network systems; an emerging discipline [ R ]. Carnegie Mellon,SEI, Technical Report CMU/SEI97-TR-013,1997.
  • 4Microsoft.Microsoft Windows DNA 2000-the platform for building the business Intemet. http ://www. microsoft. com/technet/archive/itsolutions/intranet/build/dna2k, mspx[EB/OL], 1999-12-01.
  • 5SUN. Java 2 platform, enterprise edition ( J2 EE) overview.http://java. sun. com/j2ee/overview. html [ EB/OL].2005- 10-20.
  • 6Object Management Group. The Common Object Request Broker (CORBA) : architecture and specification [ R ]. Object Management Group, Technical report, V2.0, November 1995.
  • 7S Vinoski. CORBA. integrating diverse applications within distributed heterogeneous environments [ J ]. IEEE, 1997,Communications Magazine ,35(2 ) :46 - 55.
  • 8S Vinoski. New features for CORBA 3.0[ J]. ACM, 1998,Communications ,41 (10) :44 - 52.
  • 9P Felber, P Narasimhan. Experiences, strategies, and challenges in building fault-tolerant CORBA systems[J]. IEEE Trans,2004, Computers, 53 ( 5 ) :497 - 511.
  • 10J S Balasubramaniyan, J O Garcia-Femandez, D Isacoff, et al. An architecture for intrusion detection using autonomous agents[ A]. IEEE Proceedings on Computer Security Applications Conference[ C]. New York :IEEE Press, 1998.13 -24.

共引文献3

同被引文献48

引证文献4

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部