期刊文献+

容侵模型分析

Analyze in the mode of intrusion tolerance
在线阅读 下载PDF
导出
摘要 随着入侵手段的不断变化、发展,防火墙和入侵检测技术已经不能完全保证系统的安全性,如果在系统被入侵后还要提供一定的服务或者是降级的服务,这就需要容侵系统来维护这些服务的继续.分析了最近国际、国内的一些主要的容侵模型,并针对不同的模型给出一定的评价.通过这些分析可知,容侵技术继入侵检测、防火墙技术之后必将成为未来网络服务器的必备技术. With the method of intrusion changing, firewall and intrusion detection technology can not protect the system's safety enough. If you want the system keep on providing servers when the system has been broken in, this can be realized by intrusion tolerance system. Introduce the models of intrusion tolerance in overseas and internal and provide some opinions aiming at various models. The result show that intrusion tolerance will be a absolutely necessarily technology of network servers.
出处 《哈尔滨工业大学学报》 EI CAS CSCD 北大核心 2005年第9期1252-1255,1276,共5页 Journal of Harbin Institute of Technology
关键词 容侵模型 漏洞 攻击 intrusion tolerance model leak intrusion
  • 相关文献

参考文献8

  • 1WANG F, UPPALLI R. SITAR: A scalable intrusion -tolerant architecture for distributed services - a technology summary[ J ]. Proceedings DARPA DISCEX Ⅲ, Information Survivability Conference and Exposition, 2003(2) :153 -155.
  • 2WANG R, WANG F, BYRD G. Design and implementation of acceptance monitor for building scalable intrusion tolerant system[ A ]. Proceedings Tenth International Conference on Computer Communications and Networks ( ICCCN 2001 ) [ C]. [ s. l. ]: [ s. n. ], 2001.
  • 3HUANG Zunguo, LU Xicheng, WANG Huaimin. A Diversified Dynamic Redundancy Method Exploiting the Intrusion Tolerance, Information Survivability Workshop 2000 ( ISW - 2000) [ EB/OL ]. www. cert. org/research/isw/isw2000/papers/8, pdf.
  • 4GOSEVA - POPSTOJANOVA K,WANG Feiyi, WANG Rong , et al. Characterizing Intrusion Tolerant Systems Using A State Transition Model. ( DISCEXIIO1 ) [ EB/OL]. http:// panda, ece. utk. edu/~ fwang2/papers/darpa00, pdf, 2002.
  • 5LIU Peng. Architectures for intrusion tolerance database systems[ A]. Proc. 2002 Annual Computer Security Applications Conference[ C]. [ s. l. ]: [ s. n. ] ,2002.
  • 6DUTERTRE B, SAIDI H, STAVRIDOU V. Intrusion-Tolerant Group Management in Enclaves. DSN01 [ EB/OL]. www. sdl. sri. com/papers/dsn01w,2001.
  • 7DESWARTE Y, BLAIN L, FABRE J - C. Intrusion tolerance in distributed computing systems [ A ]. Proc. of the 1991 IEEE Symposium on Research in Security and Privacy [C]. [s. l.]:[s.n.],1991.
  • 8RANDELL B, FABRE Jean - Charles. Fault and intrusion tolerance in object - oriented systems [ A ]. IEEE Technical Committee on Operating Systems and Application Environments (TCOS[C]. [s. l. ]: [s. n. ], 1991.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部