期刊文献+

动态异构冗余的Web威胁感知技术研究 被引量:3

Research on dynamic heterogeneity redundant Web threat awareness technology
下载PDF
导出
摘要 威胁感知技术作为保障系统稳定运行的重要组成部分,在Web服务系统中得到了广泛的应用。针对动态异构冗余的Web服务环境,利用多余度裁决的方法感知威胁,使得系统具备良好的阻断攻击过程、感知漏洞威胁的能力。本文首先介绍了动态异构冗余架构及其Web威胁感知系统的设计方法。然后通过比较不同威胁感知系统在不同架构下的应用效果,阐述动态异构冗余的Web威胁感知系统的设计特点与难点。最后总结并展望动态异构冗余的Web威胁感知技术面临的挑战和发展前景。 Threat awareness technology,as an important part of ensuring the stable operation of the system,has been widely applied in the Web service system. According to the dynamic heterogeneous redundant( DHR) Web service environment,the system has a good ability to block the attack process and perceive the threat of vulnerability by using the method of redundancy adjudication to perceive the threat. First,the paper introduces the DHR structure and design method of the Web threat awareness system. Second,the paper explains the security design features and difficulties of the DHR Web threat awareness system by comparing the application effect of different DHR structure. Finally,the summarization and the development of the DHR Web threat awareness system are discussed.
作者 李卫超 冯俊龙 LI Weichao;FENG Junlong(State Key Laboratory of Mathematical Engineering and Advanced Computing,Zhengzhou 450001,China;School of Computer Science and Technology,Harbin Institute of Technology,Harbin 150001,China)
出处 《智能计算机与应用》 2018年第4期37-41,47,共6页 Intelligent Computer and Applications
基金 上海市科学技术委员会科研计划项目(16DZ1120502)
关键词 动态异构冗余架构 威胁感知 异构Web容器 Web服务软件栈 dynamic heterogeneity redundant structure threat awareness heterogeneity Web container Web service software stack
  • 相关文献

参考文献7

二级参考文献25

  • 1刘奇旭,张翀斌,张玉清,张宝峰.安全漏洞等级划分关键技术研究[J].通信学报,2012,33(S1):79-87. 被引量:36
  • 2韩京宇,徐立臻,董逸生.一种大数据量的相似记录检测方法[J].计算机研究与发展,2005,42(12):2206-2212. 被引量:32
  • 3孙红兵,陈沫,蔡一兵,李忠诚.IPv4/IPv6转换网关性能测试方法研究[J].计算机工程,2006,32(24):93-95. 被引量:3
  • 4Elena Gabriela Barrantes,David H Ackley,Trek S Palmer,et al.Randomized instruction set emulation to disrupt binary code injection attacks[C] //CCS'03:Proceedings of the 10th ACM conference on Computer and communications security,New York,NY,USA,2003:281-289.
  • 5Sandeep Bhatkar,Daniel C DuVarney,Sekar r.Address obfuscation:an efficient approach to combat a board range of memory error exploits[C] //Proceedings of the 12th conference on USENIX Security Symposium,Berkeley,CA,USA,2003:8.
  • 6Cox B,Evans D,Filipi A,et al.N-variant systems-A secretless framework for security through diversity[C] //Proceedings of the 15th USENIX Security Symposium,August 2006.
  • 7Debin Gao,Michael K Reiter,Dawn Song.Behavioral distance for intrusion detection[C] //Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection (RAID 2005),2005:63-81.
  • 8Debin Gao,Michael K Reiter,Dawn Song.Behavioral distance measurement using hidden markov models[C] //Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006),2006:19-40.
  • 9Geer D,Bace R,Gutmann P,et al.The cost of monopoly.Technical report,CCIA,2003.
  • 10Gaurav S Kc,Angelos D Keromytis,Vassilis Prevelakis.Countering code-injection attacks with instruction-set randomization[C] //Proceedings of the 10th ACM conference on Computer and communications security,New York,NY,USA,ACM,2003:272-280.

共引文献260

同被引文献12

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部