期刊文献+

基于状态转换模型的容侵系统研究 被引量:6

The Research of Intrusion Tolerance System Based on State Transition Model
在线阅读 下载PDF
导出
摘要 Intrusion tolerance system is a new technology of network security. It can provide acceptable or degraded system service when intrusions occur. In this article, the system's basic function, technique and objective are introduced. A kind of state transition model is discussed. The intrusion tolerance architecture based on state the transition model and several vulnerabilities cases are proposed. Intrusion tolerance system is a new technology of network security. It can provide acceptable or degraded system service when intrusions occur. In this article, the system's basic function, technique and objective are introduced. A kind of state transition model is discussed. The intrusion tolerance architecture based on state the transition model and several vulnerabilities cases are proposed.
出处 《计算机科学》 CSCD 北大核心 2003年第4期61-64,共4页 Computer Science
基金 国家自然科学基金(90104005) 国家自然科学基金(66973034)
关键词 容侵系统 状态转换模型 防火墙 入侵检测系统 计算机网络 网络安全 State transition model, Intrusion tolerance, Network security, Architecture
  • 相关文献

参考文献7

  • 1Du W, Mathur A P. Vulnerability testing of software system using fault injection: [Technical Report Coast TR-98-02].Department of Computer Science, Purdue University, 1998.
  • 2MCNC, D, University. Sitar : A scalable intrusion tolerant architecture for distributed services : [Technical report, Research Provosal to DARPA BAA-00-15]. 2000.
  • 3Lee-P A, Anderson T. Fault Tolerance: Principles and Practice.Springer Verlag, 1990.
  • 4Amoroso E G.Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back. Traps, and Response.Intrusion. Net Books, 1999.
  • 5Krsul I, SpaRord E H, Tripunitara M V. Computer vulnerability analysis: [Technical Report Coast TR 98-07]. Department of Computer Science, Purdue University, 1998.
  • 6Ellison R J, et al. Survivability : Protecting your critical systems.IEEE Internet Computing, 1999,3(6) : 55~63.
  • 7Northcutt S, Novak J. Network Intrusion Detection: An Analysts' Handbook. New Riders, Sep. 2000.

同被引文献47

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部