Proactive Recovery in Intrusion-Tolerant System Based on TTCB

被引:0
|
作者
Zhou Hua [1 ]
Zhou Hai-jun [1 ]
Ma Jian-feng [1 ]
机构
[1] Xian Commun Inst, Xian 710106, Peoples R China
来源
2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012) | 2012年
关键词
intrusion tolerance; proactive recovery; TTCB; network security;
D O I
10.1109/ICCECT.2012.210
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes two proactive recovery mechanisms, i.e., periodic grouped proactive recovery and annular proactive recovery. The periodic grouped proactive recovery divides the replicas into groups and each group recover periodically in round. The annular proactive recovery adopts a kind of annular system structure and recovers the replicas dynamically. Although there are some differences between grouped proactive recovery and annular proactive recovery in system size, availability, and security, the results of simulation experiments show that two proactive recovery mechanisms both can improve the availability obviously.
引用
收藏
页码:799 / 802
页数:4
相关论文
共 50 条
  • [1] Highly Available Intrusion-Tolerant Services with Proactive-Reactive Recovery
    Sousa, Paulo
    Bessani, Alysson Neves
    Correia, Miguel
    Neves, Nuno Ferreira
    Verissimo, Paulo
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2010, 21 (04) : 452 - 465
  • [2] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [3] A survey on intrusion-tolerant system
    Yoon, H. (hyoon@nslab.kaist.ac.kr), 1600, Korean Institute of Information Scientists and Engineers (07):
  • [4] A Network Intrusion-Tolerant System Based on Adaptive Algorithm
    Zhao, Hui
    Zheng, Shanhong
    Li, Wanlong
    Zhang, LiJuan
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 2890 - 2893
  • [5] Intrusion-tolerant based survivable model of database system
    Zhu, JM
    Wang, C
    Ma, JF
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 481 - 484
  • [6] An intrusion-tolerant password authentication system
    Wang, XH
    Heydari, MH
    Lin, H
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
  • [7] A Comparison of Intrusion-Tolerant System Architectures
    Nguyen, Quyen L.
    Sood, Arun
    IEEE SECURITY & PRIVACY, 2011, 9 (04) : 24 - 31
  • [8] Model-based validation of an intrusion-tolerant information system
    Stevens, F
    Courtney, T
    Singh, S
    Agbaria, A
    Meyer, JF
    Sanders, WH
    Pal, P
    23RD IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2004, : 184 - 194
  • [9] Intrusion-tolerant enclaves
    Dutertre, B
    Crettaz, V
    Stavridou, V
    2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2002, : 216 - 224
  • [10] Probabilistic validation of an intrusion-tolerant replication system
    Singh, S
    Cukier, M
    Sanders, WH
    2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 615 - 624