A Network Intrusion-Tolerant System Based on Adaptive Algorithm

被引:0
|
作者
Zhao, Hui [1 ]
Zheng, Shanhong [1 ]
Li, Wanlong [1 ]
Zhang, LiJuan [1 ]
机构
[1] Changchun Univ Technol, Coll Comp Sci & Engn, Changchun 130012, Peoples R China
来源
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8 | 2009年
关键词
Intrusion Tolerance; Adaptive Algorithm; Network Security; Trigger Mechanism;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A network intrusion-tolerant system based on adaptive agorithm is put forward. It adopts a new intrusion tolerance trigger mechanism by use of improved adaptive algorithm, which enhances studying efficiency and ensures that intrusion tolerance system can study in real time and in an unsupervised way. The experimental results show that the intrusion tolerance system based on adaptive algorithm increase sensitivity and adaptability of tolerance to intrusion behavior.
引用
收藏
页码:2890 / 2893
页数:4
相关论文
共 50 条
  • [21] An intrusion-tolerant mechanism for intrusion detection systems
    Kuang, Liwei
    Zulkernine, Mohammad
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 319 - +
  • [22] A novel, adaptive replica control protocol for distributed intrusion-tolerant environments
    Guo Yuanbo
    Wang Yadi
    Yu Yanping
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 163 - +
  • [23] Intrusion-tolerant architectures:: Concepts and design
    Veríssimo, PE
    Neves, NF
    Correia, MP
    ARCHITECTING DEPENDABLE SYSTEMS, 2003, 2677 : 3 - 36
  • [24] Worm-IT -: A wormhole-based intrusion-tolerant group communication system
    Correia, Miguel
    Neves, Nuno Ferreira
    Lung, Lau Cheuk
    Verissimo, Paulo
    JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (02) : 178 - 197
  • [25] An adaptive intrusion-tolerant approach to protecting operation security of cryptographic protocols
    Hao, Yaohui
    Guo, Yuanbo
    Lu, Yu
    Gaojishu Tongxin/Chinese High Technology Letters, 2009, 19 (07): : 706 - 712
  • [26] Design of a Lightweight Intrusion-Tolerant System for Highly Available Servers
    Okamoto, Takeshi
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS, 2017, 112 : 2319 - 2327
  • [27] Secure intrusion-tolerant replication on the Internet
    Cachin, C
    Poritz, JA
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 167 - 176
  • [28] Intrusion-tolerant group management in enclaves
    Dutertre, B
    Saïdi, H
    Stavridou, V
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2001, : 203 - 212
  • [29] Network-Attack-Resilient Intrusion-Tolerant SCADA for the Power Grid
    Babay, Amy
    Tantillo, Thomas
    Aron, Trevor
    Platania, Marco
    Amir, Yair
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 255 - 266
  • [30] A Scalable and Intrusion-tolerant Digital Time-stamping System
    Tulone, Daniela
    2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2357 - 2363