期刊文献+

一种基于性能反馈的入侵容忍路由协议

下载PDF
导出
摘要 针对现有入侵容忍协议存在的不足,往往只是考虑网络容侵性能而很少关注QOS性能,设计一种的基于性能反馈的新型检测机制,从而标记网络异常节点,选择可靠节点作为簇头,并进而提出一种基于性能反馈的PFITP容侵路由协议,既能容忍网络中的主要攻击类型,又能持续优化网络性能,以期给实际中的无线传感器网络应用带来更好的鲁棒性和安全性。
作者 高惠燕
机构地区 浙江万里学院
出处 《电脑知识与技术》 2017年第7期40-42,共3页 Computer Knowledge and Technology
基金 浙江省教育厅科研项目资助(Y201534559)
  • 相关文献

参考文献3

二级参考文献15

  • 1王超,马建峰.可生存网络系统的构建方法[J].电子学报,2005,33(B12):2336-2341. 被引量:4
  • 2Allen J. , Christie A. , Fithen W. et al. State of the practice of intrusion detection technologies. Carnegie Mellon, SEI, Technical Report: CMU/SEI-99-TR-028, 2000
  • 3Fraga J. S. , Powell D.. A fault- and intrusion-tolerant file system. In: Proceedings of the 3rd International Conference on Computer Security, Dublin, Ireland, 1985, 203-218
  • 4Jonsson E. , Olovsson T.. A quantitative model of the security intrusion process based on attacker behavior. IEEE Transactions on Software Engineering, 1997, 23(4): 235-245
  • 5Gong F, , Goseva-PopstojanovaVaid-yanathan K. , Trivedi K. ,K., Wang F., Wang R.Muthusamy B.. Characterizing intrusion tolerant systems using a state transition model.In: Proceedings of the DARPA Information Survivability Conference and Exposition(DISCEX II), 2001, 2:211-221
  • 6Jha S. , Wing J. M.. Survivability analysis of networked systems. In: Proceedings of the 23rd International Conference on Software Engineering, Toronto, Canada, 2001, 307-317
  • 7Ortalo R. , Deswarte Y. , Kaaniche M.. Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Transactions on Software Engineering, 1999, 25(5) :633-650
  • 8Sheyner O. , Haines J. , Jha S. , Lippmann R. , Wing J. M..Automated generation and analysis of attack graphs. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA, 2002, 273-284
  • 9Wang D. Z. , Madan B. B. , Trivedi K.S.. Modeling SITAR system security. In: Proceedings of the 14th IEEE International Symposium on Software Reliability Engineering, 2003, Denver, USA, C-2 Fast Abstracts
  • 10Madan B. B. , Goseva-Popstojanova K. , Vaidyanathan K. ,Trivedi K. S.. A method for modeling and quantifying the security attributes of intrusion tolerant systems. Performance Evaluation, 2004, 56(1-4): 167-186

共引文献40

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部