A Network Intrusion-Tolerant System Based on Adaptive Algorithm

被引:0
|
作者
Zhao, Hui [1 ]
Zheng, Shanhong [1 ]
Li, Wanlong [1 ]
Zhang, LiJuan [1 ]
机构
[1] Changchun Univ Technol, Coll Comp Sci & Engn, Changchun 130012, Peoples R China
关键词
Intrusion Tolerance; Adaptive Algorithm; Network Security; Trigger Mechanism;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A network intrusion-tolerant system based on adaptive agorithm is put forward. It adopts a new intrusion tolerance trigger mechanism by use of improved adaptive algorithm, which enhances studying efficiency and ensures that intrusion tolerance system can study in real time and in an unsupervised way. The experimental results show that the intrusion tolerance system based on adaptive algorithm increase sensitivity and adaptability of tolerance to intrusion behavior.
引用
收藏
页码:2890 / 2893
页数:4
相关论文
共 50 条
  • [1] Intrusion-tolerant intrusion detection system
    Yi, MK
    Hwang, CS
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2004, 3073 : 476 - 483
  • [2] An architecture for an adaptive intrusion-tolerant server
    Valdes, A
    Almgren, M
    Cheung, S
    Deswarte, Y
    Dutertre, B
    Levy, J
    Saïdi, H
    Stavridou, V
    Uribe, TE
    SECURITY PROTOCOLS, 2004, 2845 : 158 - 177
  • [3] Distributed group membership algorithm in intrusion-tolerant system
    Yin, LH
    Fang, BX
    Yu, XZ
    ADVANCED WEB AND NETWORK TECHNOLOGIES, AND APPLICATIONS, PROCEEDINGS, 2006, 3842 : 511 - 515
  • [4] An architecture for adaptive intrusion-tolerant applications
    Pal, Partha
    Rubel, Paul
    Atighetchi, Michael
    Webber, Franklin
    Sanders, William H.
    Seri, Mouna
    Ramasamy, HariGovind
    Lyons, James
    Courtney, Tod
    Agbaria, Adnan
    Cukier, Michel
    Gossett, Jeanna
    Keidar, Idit
    SOFTWARE-PRACTICE & EXPERIENCE, 2006, 36 (11-12): : 1331 - 1354
  • [5] A survey on intrusion-tolerant system
    Yoon, H. (hyoon@nslab.kaist.ac.kr), 1600, Korean Institute of Information Scientists and Engineers (07):
  • [6] A lightweight intrusion-tolerant overlay network
    Obelheiro, Rafael R.
    Fraga, Joni da Silva
    NINTH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT AND COMPONENT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, PROCEEDINGS, 2006, : 496 - 503
  • [7] Intrusion-tolerant based survivable model of database system
    Zhu, JM
    Wang, C
    Ma, JF
    CHINESE JOURNAL OF ELECTRONICS, 2005, 14 (03): : 481 - 484
  • [8] Proactive Recovery in Intrusion-Tolerant System Based on TTCB
    Zhou Hua
    Zhou Hai-jun
    Ma Jian-feng
    2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, : 799 - 802
  • [9] An intrusion-tolerant password authentication system
    Wang, XH
    Heydari, MH
    Lin, H
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 110 - 118
  • [10] A Comparison of Intrusion-Tolerant System Architectures
    Nguyen, Quyen L.
    Sood, Arun
    IEEE SECURITY & PRIVACY, 2011, 9 (04) : 24 - 31