期刊文献+

入侵容忍技术现状与发展 被引量:12

Intrusion Tolerance Technology——Survey and Direction
下载PDF
导出
摘要 入侵容忍技术是美国提出的第三代安全的核心。入侵容忍是一种主动防护能力,当受保护系统的部分组件受到攻击时,入侵容忍旨在能维持整个系统关键信息和服务的完整性、机密性和可用性。本文介绍了入侵容忍技术的理论基础,包括系统故障模型、入侵容忍机制和入侵容忍策略;通过将入侵容忍同入侵检测、容错技术对比,研完了入侵容忍的应用特征;从应用类型、研究层次和领域问题对入侵容忍研究工作进行了分类;通过介绍OASIS计划支持的几个典型项目总结了入侵容忍研究工作现状;对该技术的未来发展进行了分析。 Intrusion tolerance technology(ITT)is the core of 'the 3rd Generation Security(3GS)'. When some compo-nents of the protected system are attacked, ITT aims to maintain the integrity, confidentiality and availability of the critcal data and services provided by the whole system. This paper introduces the theoretical background, mechanisms and strategies of ITT. By comparison of ITT with intrusion detection and fault tolerance technology, the application characteristics are described. Some typical projects supported by OASIS program are briefly investigated to present the research state of the art of ITT. The paper ends with the perspectives of ITT and authors' next work.
出处 《计算机科学》 CSCD 北大核心 2004年第10期19-22,27,共5页 Computer Science
基金 国家863课题(编号:2002AA142040)资助
关键词 入侵容忍 入侵检测 组件 攻击 容错技术 系统故障 分组 完工 服务 项目 Intrusion tolerant system, Threshold cryptography, Fault model, Error recovery, Group communication system
  • 相关文献

参考文献20

  • 1Fraga J,Powell D. A fault-and intrusion-tolerant file system. In:Proc. of the 3rd Intl. Conf. on Computer Security,1985. 203-218
  • 2Deswarte Y,Blain L, Fabre J-C. Intrusion tolerance in distributed computing systems. In: Proc. of the 1991 IEEE Symposium on Research in Security and Privacy, 1991.110- 121
  • 3Powell D,Stroud R. Conceptual Model and Architecture of MAFTIA, MAFTIA Deliverable D21, Project MAFTIA IST-1999-11583, Jan. 2003, Research Report, RZ 3377, IBM Zurich Research Laboratory. http:∥www. newcastle. research. ec. org/maftia/deliverables/D21. p
  • 4Malkin M, Wu T, Boneh D. Building Intrusion Tolerance Applications. DARPA Information Survivability Conference & Exposition - Volume 1, Hilton Head, South Carolina, Jan. 2000
  • 5Cheung S. An Intrusion Tolerance Approach for Protecting Network Infrastructure. Dissertations. University of California at Davis http:∥seclab. cs. ucdavis. edu/papers/Dissertations/S.Cheungdissertation. PDF, 2003
  • 6Luenam P,Liu P. The Design of an Adaptive Intrusion Tolerant Database System
  • 7Sames D,Matt B,Niebuhr B, et al. Developing a Heterogeneous Intrusion Tolerant CORBA System. In:Proc. of the Intl. Conf.on Dependable Systems and Networks(DSN'02)
  • 8Pal P P,Webber F,Schantz R E, et al. Intrusion Tolerant Systems. IEEE Information Survivability Workshop(ISW-2000)
  • 9Stavridou V, Dutertre B, Riemenschneider R A, et al. Intrusion Tolerant Software Architectures. In: Proc. of the DARPA Information survivability Conference and Exposition(DISCEXII'01)
  • 10Madan B B, Goseva-Popstojanova K,Vaidyanathan K, Trivedi K S. Modeling and quantification of security attributes of software systems. In:Proc. Int. Conf. DSN, (IPDS stream), volume 2,2002. 505-514

同被引文献88

引证文献12

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部