期刊文献+

面向自律容侵的主动诱骗算法

Autonomic Intrusion Tolerance-oriented Automatic deception algorithm
在线阅读 下载PDF
导出
摘要 针对现有网络诱骗技术需要过多人工参与且无法保障诱骗效率和准确度的问题,提出了面向自律计算的具有容侵特性的主动诱骗算法,分为服务移植和诱骗机制2个阶段.服务移植主要完成可疑信息重定向和可信信息访问恢复,实现目标系统的安全隔离;诱骗子网主要实现攻击信息的主动诱骗、特征分析和自律联想学习.仿真实验结果表明,在同等入侵条件下,加载ADAIT算法的系统平均事务响应时间缩短38.96%,吞吐率提高59.43%,每秒HTTP响应数增加13.25%,服务器的关键性能明显提升. Current network deception technology needs manual intervention,yet cannot ensure deception is efficient and effective.An automatic deception algorithm using autonomic intrusion tolerance(ADAIT) was proposed.The functions were divided into two stages,the first service transplant and the second deception mechanisms.Service transplant completes retargeting of suspicious information and recovering of legal access,implementing security isolation for the object system.Deception mechanisms provide automatic deception,feature analysis and autonomic associative study of attack information.The simulation results showed that with the help of ADAIT,given the same intrusions,the average transaction response time was reduced by 38.96%,throughput was enhanced by 59.43%,and the number of HTTP responses per second was increased by 13.25%.These key indicators of server performance were obviously improved.
出处 《哈尔滨工程大学学报》 EI CAS CSCD 北大核心 2010年第8期1048-1053,共6页 Journal of Harbin Engineering University
基金 国家自然科学基金资助项目(60973027) 中央高校基本科研业务费专项资金(HEUF100601) 黑龙江省科技攻关基金资助项目(GC09A104) 哈尔滨市科技创新人才研究基金资助项目(2010RFQXG026)
关键词 自律容侵 主动诱骗 服务移植 诱骗子网 联想学习 autonomic intrusion tolerance automatic deception service transplant trapping subnetl associative study
  • 相关文献

参考文献13

  • 1KUWATLY Z, MASRI M, ARTAIL H. A dynamic honeypot design for intrusion detection [ C ]//ACS/IEEE Intl Conf on Pervasive Services (ICPS 2004). Beirut, Lebanon, 2004.
  • 2THAKAR U. HoneyAnalyzer : analysis and extraction of intrusion detection patterns & signatures using honeypot [ C ]// The 2nd Intl Conf on Innovations in Information Technology. Dubai, UAE, 2005.
  • 3JIANG Xuxian, XU Dongyan, WANG Yimin. Collapsar : a VM based honeyfarm and reverse honeyfarm architecture for network attack capture and detention[J]. Journal of Parallel and Distributed Computing, 2006, 66(9) : 1165-1180.
  • 4YEGNESWARAN. An architecture for generating semanticsaware signatures [ C ]// Usenix Security Symposium. Baltimore, MD, 2005.
  • 5郁纬,胡蓓,陈昌芳.入侵诱骗系统中的的数据捕获[J].网络安全技术与应用,2007(3):36-38. 被引量:2
  • 6陈昌芳,李俊,郁纬,胡蓓.入侵诱骗系统下数据的分析[J].网络安全技术与应用,2007(10):35-36. 被引量:1
  • 7HORN P. Autonomic computing: IBM perspective on the state of information technology[R]. Armonk : IBM ,2001.
  • 8张海俊,史忠植.自主计算环境[J].计算机工程,2006,32(7):1-3. 被引量:10
  • 9KEPHART, CHESS J O D M. The vision of autonomic computing[ J]. IEEE Computer Society: IEEE Press, 2003,36 (1) : 41-50.
  • 10STERRITT R, PARASHAR M, TIANFIELD H. A concise introduction to autonomic computing [ J ]. Advanced Engineering Informatics, 2005,19 : 181-187.

二级参考文献17

  • 1Jiang Yuncheng,Shi Zhongzhi,Zhang Haijun,et al.Dynamic Service Matchmaking in Intelligent Web[J].Journal of Web Engineering,2004,2(3):131-147.
  • 2Shi Zhongzhi,Zhang Haijun,Dong Mingkai.MAGE:Multi-agent Environment[C].ICCNMC('03).IEEE CS Press,2003.
  • 3Kephart J,Chess D.The Vision of Autonomic Computing[R].IEEE Computer Society,2003:41-59.
  • 4Jann J,Browning L A,Burugula R S.Dynamic Reconfiguration:Basic Building Blocks for Autonomic Computing on IBM pSeries Servers[J].IBM Systems Journal,2003,42(1):29-37.
  • 5Hariri S,Xue Lizhi,Chen Huoping,et al.AUTONOMIA:An Autonomic Computing Environment[C].Proc.of International Perfor-mance Computing and Communications Conference,2003.
  • 6查看详情.
  • 7Honeynet Project:Know Your Enemy:Honeynets,2006.
  • 8Moran D B.Effective Deployment of Honeypot ainst Internal and External Threats,2000.
  • 9Kumar Sandeep.Classification and detection of computer intrusions,1995.
  • 10Lunt T F;Tamaru A;Gilham F.A Rea12time intrusion detection expert system(IDES),1992.

共引文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部