A Network Intrusion-Tolerant System Based on Adaptive Algorithm

被引:0
|
作者
Zhao, Hui [1 ]
Zheng, Shanhong [1 ]
Li, Wanlong [1 ]
Zhang, LiJuan [1 ]
机构
[1] Changchun Univ Technol, Coll Comp Sci & Engn, Changchun 130012, Peoples R China
来源
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8 | 2009年
关键词
Intrusion Tolerance; Adaptive Algorithm; Network Security; Trigger Mechanism;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A network intrusion-tolerant system based on adaptive agorithm is put forward. It adopts a new intrusion tolerance trigger mechanism by use of improved adaptive algorithm, which enhances studying efficiency and ensures that intrusion tolerance system can study in real time and in an unsupervised way. The experimental results show that the intrusion tolerance system based on adaptive algorithm increase sensitivity and adaptability of tolerance to intrusion behavior.
引用
收藏
页码:2890 / 2893
页数:4
相关论文
共 50 条
  • [41] Intrusion-tolerant server architecture for survivable services
    Min B.J.
    Journal of Supercomputing, 2005, 33 (01): : 93 - 102
  • [42] On the effects of finite memory on intrusion-tolerant systems
    Veronese, Giuliana Santos
    Correia, Miguel
    Lung, Lau Cheuk
    Verissimo, Paulo
    13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 401 - 404
  • [43] DiveInto: Supporting Diversity in Intrusion-Tolerant Systems
    Antunes, Joao
    Neves, Nuno
    2011 30TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS (SRDS), 2011, : 137 - 146
  • [44] On the correctness of an intrusion-tolerant group communication protocol
    Layouni, M
    Hooman, J
    Tahar, S
    CORRECT HARDWARE DESIGN AND VERIFICATION METHODS, PROCEEDINGS, 2003, 2860 : 231 - 246
  • [45] An Intrusion-tolerant Secure Routing Protocol with Key Exchange for Wireless Sensor Network
    Zhou, Jiliang
    Li, Caixia
    Cao, Qiying
    Shen, Yu
    2008 INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, VOLS 1-4, 2008, : 1547 - 1552
  • [46] A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting
    Zeng, Rongfei
    Jiang, Yixin
    Lin, Chuang
    Fan, Yanfei
    Shen, Xuemin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (10) : 1819 - 1830
  • [47] Survivable SCADA Via Intrusion-Tolerant Replication
    Kirsch, Jonathan
    Goose, Stuart
    Amir, Yair
    Wei, Dong
    Skare, Paul
    IEEE TRANSACTIONS ON SMART GRID, 2014, 5 (01) : 60 - 70
  • [48] Intrusion-Tolerant Server Architecture for Survivable Services
    Byoung Min Joon
    The Journal of Supercomputing, 2005, 33 (1) : 93 - 102
  • [49] Intrusion-tolerant middleware -: The road to automatic security
    Verissimo, Paulo E.
    Neves, Nuno F.
    Cachin, Christian
    Poritz, Jonathan
    Powell, David
    Deswarte, Yves
    Stroud, Robert
    Welch, Ian
    IEEE SECURITY & PRIVACY, 2006, 4 (04) : 54 - 62
  • [50] Design and implementation of an intrusion-tolerant application server middleware-based
    Guo Y.
    Liu W.
    Yuan S.
    Zhou R.
    Gaojishu Tongxin/Chinese High Technology Letters, 2010, 20 (07): : 661 - 667