A Network Intrusion-Tolerant System Based on Adaptive Algorithm

被引:0
|
作者
Zhao, Hui [1 ]
Zheng, Shanhong [1 ]
Li, Wanlong [1 ]
Zhang, LiJuan [1 ]
机构
[1] Changchun Univ Technol, Coll Comp Sci & Engn, Changchun 130012, Peoples R China
来源
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8 | 2009年
关键词
Intrusion Tolerance; Adaptive Algorithm; Network Security; Trigger Mechanism;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A network intrusion-tolerant system based on adaptive agorithm is put forward. It adopts a new intrusion tolerance trigger mechanism by use of improved adaptive algorithm, which enhances studying efficiency and ensures that intrusion tolerance system can study in real time and in an unsupervised way. The experimental results show that the intrusion tolerance system based on adaptive algorithm increase sensitivity and adaptability of tolerance to intrusion behavior.
引用
收藏
页码:2890 / 2893
页数:4
相关论文
共 50 条
  • [31] Randomized intrusion-tolerant asynchronous services
    Moniz, Henrique
    Neves, Nuno Ferreira
    Correia, Miguel
    Verissimo, Paulo
    DSN 2006 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2006, : 568 - 577
  • [32] Building intrusion-tolerant secure software
    Zhang, T
    Zhuang, XT
    Pande, S
    CGO 2005: INTERNATIONAL SYMPOSIUM ON CODE GENERATION AND OPTIMIZATION, 2005, : 255 - 266
  • [33] Poligraph: Intrusion-Tolerant and Distributed Fake News Detection System
    Shan, Guohou
    Zhao, Boxin
    Clavin, James R.
    Zhang, Haibin
    Duan, Sisi
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 28 - 41
  • [34] An intrusion-tolerant COTS-based server on heterogeneous platforms
    Wang, HQ
    Rong, X
    Du, Y
    Li, BY
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2644 - 2649
  • [35] Evaluating Intrusion-Tolerant Certification Authority Systems
    Lin, Jingqiang
    Jing, Jiwu
    Liu, Peng
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2012, 28 (08) : 825 - 841
  • [36] Deploying Intrusion-Tolerant SCADA for the Power Grid
    Babay, Amy
    Schultz, John
    Tantillo, Thomas
    Beckley, Samuel
    Jordan, Eamon
    Ruddell, Kevin
    Jordan, Kevin
    Amir, Yair
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2019), 2019, : 328 - 335
  • [37] An intrusion-tolerant and self. recoverable network service system using a security enhanced chip multiprocessor
    Shi, WD
    Lee, HHS
    Gu, GF
    Falk, L
    Mudge, TN
    Ghosh, M
    ICAC 2005: SECOND INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, PROCEEDINGS, 2005, : 263 - 273
  • [38] An intrusion-tolerant intrusion detection method based on real-time sequence analysis
    Zhao, Feng
    Li, Qing-Hua
    Jin, Li
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2692 - +
  • [39] Intrusion-tolerant server architecture for survivable services
    Min, YJ
    JOURNAL OF SUPERCOMPUTING, 2005, 33 (1-2): : 93 - 102
  • [40] A novel intrusion-tolerant approach for Internet access
    Wen, Yan
    Zhao, Jinjing
    Wang, Huaimin
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION PROCESSING AND 2008 INTERNATIONAL PACIFIC WORKSHOP ON WEB MINING AND WEB-BASED APPLICATION, 2008, : 485 - +