期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Building Intrusion Tolerant Software System 被引量:3
1
作者 PENGWen-ling WANGLi-na +1 位作者 ZHANGHuan-guo CHENWei 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期47-50,共4页
In this paper, we describe and analyze the hypothesis about intrusiontolerance software system, so that it can provide an intended server capability and deal with theimpacts caused by the intruder exploiting the inher... In this paper, we describe and analyze the hypothesis about intrusiontolerance software system, so that it can provide an intended server capability and deal with theimpacts caused by the intruder exploiting the inherent security vulnerabilities. Wepresent someintrusion tolerance technology by exploiting N-version module threshold method in constructingmultilevel secure software architecture, by detecting with hash value, by placing an 'antigen' wordnext to the return address on the stack thatis similar to human immune system, and by adding 'Honeycode' nonfunctional code to disturb intruder, so that the security and the availability of thesoftware system are ensured. 展开更多
关键词 intrusion tolerant immune code Honey code trusted computing
下载PDF
ISDTM:An Intrusion Signatures Description Temporal Model 被引量:1
2
作者 OuYangMing-guang ZhouYang-bo 《Wuhan University Journal of Natural Sciences》 CAS 2003年第02A期373-378,共6页
ISDTM, based on an augmented Allen's interval temporal logic (ITL) and first-order predicate calculus, is a formal temporal model for representing intrusion signatures. It is augmented with some real time extensio... ISDTM, based on an augmented Allen's interval temporal logic (ITL) and first-order predicate calculus, is a formal temporal model for representing intrusion signatures. It is augmented with some real time extensions which enhance the expressivity. Intrusion scenarios usually are the set of events and system states, where- the temporal sequence is their basic relation. Intrusion signatures description, therefore , is to represent such temporal relations in a sense. While representing these signatures, ISDTM decomposes the intrusion process into the sequence of events according to their relevant intervals, and then specifies network states in these Intervals. The uncertain intrusion signatures as well as basic temporal modes of events, which consist of the parallel mode, the sequential mode and the hybrid mode, can be succinctly and naturally represented in ISDTM. Mode chart is the visualization of intrusion signatures in ISDTM, which makes the formulas more readable. The intrusion signatures descriptions in ISDTM have advantages of compact construct, concise syntax, scalability and easy implementation. 展开更多
关键词 ISDTM uncertain intrusion signatures intru-sion detection temporal model
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部