期刊文献+

可生存系统的分层冗余结构与实现 被引量:3

Survivable system based on heterogeneous redundancy
下载PDF
导出
摘要 传统网络安全技术无法保证某些实时系统及关键性系统的持续安全。通过对基于主动响应和基于冗余两种提高系统可生存能力方法的研究分析的基础上,提出了可生存系统的分层冗余结构模型。该模型在各个层次上引进异构组件及互监视机制,既可避免基于主动响应的可生存系统检测能力和响应速度的缺陷,又能解决基于同构冗余的可生存系统无法抵抗可重复攻击的问题。实践结果表明,与传统的可生存系统模型相比,提出的分层冗余结构在系统受到恶意攻击或系统部分组建受损的情况下仍能维持一定程度的工作并持续提供服务。 Traditional network security techniques cannot ensure persistent of ability and velocity. The survivable system model is put forward based security for some real-time and critical systems for the reason on heterogeneous redundancy on the basis of comparing the active response method and the method based on redundancy. Through introducing heterogeneous components in deferent levels and the observe-on-each-other mechanism, the model solve the problem of detection ability, velocity and anti-repeatable attacks. The experimental results show that the model can maintain degraded service when under malicious intrusions.
出处 《计算机工程与设计》 CSCD 北大核心 2008年第9期2203-2205,2208,共4页 Computer Engineering and Design
关键词 网络安全 可生存性 入侵容忍 异构冗余 可生存系统 分层模型 network security survivability intrusion tolerance heterogeneous redundancy survivable system layered model
  • 相关文献

参考文献11

  • 1Vickie R Westmark. A defmition for information system survivability[C]. Hawii, USA: Proceedings of the 37th Hawii Internal Conference on System Sciences, 2004:2086-2096. 被引量:1
  • 2Ellison R. Survivability: Protecting your critical systems [J]. IEEE Intemet Computing, 1999,3 (6):55-63. 被引量:1
  • 3Fisher D, Lipson H. Emergent algorithms: A new method for enhancing survivability in unbounded systems[C]. Hawaii, USA: Proceedings of the Hawaii International Conference on System Sciences, 1999:7043. 被引量:1
  • 4Knight J C, Strunk E A. Achieving critical system survivability through software architectures[C]. WADS2003, Springer Berlin/ Heidelberg, LNCS 3069, 2004:51-78. 被引量:1
  • 5Zhang Yongguang, Son K D. Heterogeneous networking: A new survivability paradigm [C]. New Mexico: Proceedings of the 10th ACM New Security Paradigms Workshop, 2001:33-39. 被引量:1
  • 6刘键强,王韬,向阳霞,王昌盛.基于生存性的应对拒绝服务攻击的策略[J].计算机工程与设计,2004,25(4):593-595. 被引量:2
  • 7张基温,王玉斐.基于应用环境的入侵检测系统测试方案[J].计算机工程与设计,2006,27(7):1220-1223. 被引量:6
  • 8荆继武.在攻击中生存[EB/OL].http://www2.ccw.com.cn/04/0411/e/0411e18_1.asp,2005. 被引量:3
  • 9Yurcik W, Doss D, Kruse H. Survivability-over-security: Providing whole system assurance[C]. IEEE/SEI/CERT Information Survivability Workshop. Los Alamitos, USA: IEEE Computer Soc Press, 2000:201-204. 被引量:1
  • 10Nancy R Mead, Ellison R J, Richard C Linger, et al. Survi-vable network analysis method[R].USA: SEI Technical Report, 2000. 被引量:1

二级参考文献28

共引文献12

同被引文献20

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部