期刊文献+

面向服务的容忍入侵方法与设计 被引量:8

Method and Design on Services-oriented Intrusion-tolerant
下载PDF
导出
摘要 分析了入侵与故障的区别,指出在安全领域直接使用容错方法将存在模型上的不可行性.提出了一种面向特定服务的容忍入侵方法,这种方法关注的是入侵的结果而不是入侵本身,即在保证系统功能连续的情况下,利用门限密码以及大数表决等技术检测入侵的存在,然后用容错技术重构和恢复受攻击的系统.详细介绍了这种面向特定服务的容忍入侵方法的信任模型、系统架构及设计,讨论了有关的几个研究方向. It is infeasible to apply fault-tolerant directly in the security paradigm. A novel method of intrusion tolerant-specific services-oriented method is presented. It can integrate the fault tolerant into security paradigm. The traditional fault tolerant method focuses on the causes and existence of fault, and so can deal with unknown intrusion. In this method, both verifiable secret sharing and major voting are used to detect the effects of intrusion and fault-tolerant approaches. Its model and architecture are presented and some further research directions are introduced.
出处 《郑州大学学报(理学版)》 CAS 2004年第2期62-66,共5页 Journal of Zhengzhou University:Natural Science Edition
基金 国家自然科学重大计划资划项目 编号 90204012 国家863计划资助项目 编号 2002AA143021
关键词 面向服务 容忍入侵 门限密码 大数表决 容错 系统失效 网络安全 services-oriented intrusion-tolerant systems failure security
  • 相关文献

参考文献8

  • 1Pradhan D K. Fault tolerant computing: theory and techniques(Vol 1). New Jersey: Prentice-Hall, 1986.
  • 2Feldman P. A practical scheme for non-interactive verifiable secret sharing. In:Proc 28th Annual Symp, 1987. 427-437.
  • 3Schneider F. Implementing fault-tolerant services using the state machine approach: a tutorial. ACM Computing Surveys, 1990,22(4):299-319.
  • 4Shamir A. How to share a secret. Communication of the ACM, 1979,22(11):612-613.
  • 5Feldman P. A practical scheme for non-interactive verifiable secret sharing. In:Proc 28th Annual Symp. 1987. 427-437.
  • 6Guo Yuanbo, Ma Jianfeng. An efficient and robust conference key distribution protocol. In:The 2003 International Conference on Computer Networks and Mobile Computing. IEEE Press ,Shanghai,China, 2003. 20-23.
  • 7郭渊博 马建峰.一种实用的先应式安全体系架构研究[A]..见:第三届中国信息和通信安全学术会议[C].,2002.3.
  • 8郭渊博,马建峰.分布式系统中服务可生存性的定量分析[J].同济大学学报(自然科学版),2002,30(10):1190-1193. 被引量:34

二级参考文献10

  • 1Hollway B A,Neumann P G.Survivable computer-communication systems:The problem and working group recommendations[R].Washington:US Army Research Laboratory,1993.
  • 2Neumann P.Commputer related risks[M].Boston:Addison-Wesley,1995.
  • 3Marsh T.Critical foundations:Protecting america's Infrastructures[R].Washington:President's Commission on Critical Infrastructure Protection,1997.
  • 4Ellison R,Fisher D,Linger R,et al.Survivable network systems:An emerging discpline[R].Pittsburgh:Software Engineering Institute,Carnegie Mellon Univesity,1997.
  • 5Vaidya N H.A case for two-level recovery schemes[J].IEEE Transactions on Computers,1998,47(6):656-666.
  • 6Ellison R,Linger R,Longstaff T,et al.Survivability network system analysis:A case study[J].IEEE Software,1999,16(4):70-77.
  • 7Ortalo R,Deswarte Y,Kaaniche M.Experimenting with quantitative evaluation tools for monitoring operational security[J].IEEE Transactions on Software Engineering,1999,25(5):633-650.
  • 8Courcoubetis C,Yannakakis M.The complexity of probabilistic verification[J].Journal of ACM,1995,42(4):857-907.
  • 9Lann G L.Predictability in critical systems[A].Lecture Notes in Computer Science,Formal Techniques in Real-Time and Fault-Tolerant Systems[C].Berlin:Springer-Verlag,1998.315-338.
  • 10Lann G L.Proof-based system engineering and embedded systems[A].Lecture Notes in Computer Science,Embedded Systems[C].Berlin:Springer-Veraly,1998.208-248.

共引文献33

同被引文献88

引证文献8

二级引证文献34

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部