全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

面向协同防范的非侵入式ARC模型

Keywords: 协同防范,分布式环境,非侵入式,ARC模型

Full-Text   Cite this paper   Add to My Lib

Abstract:

针对分布式环境下系统的安全性问题,引入了一个基于ARC模型的非嵌入式结构,ARC模型是由actor、role和coordinator组合而成.其中,actor用来模拟计算实体,role和coordinator用来执行控制功能.模型将攻击行为的特征以约束的方式配置到coordinator、role,同时融合了入侵检测中常用的特征检测和异常检测方法.它基于message、event通讯机制,实现了对攻击行为的监测、阻击、识别、处理,提高了系统的防范攻击和生存能力.

References

[1]  刘锦德.对于开放系统内涵的澄清[J].计算机应用,1997,17(6):1-2.LIU Jin-de.Open system connotation[J].ComputerApplications,1997,17(6):1-2.(in Chinese)
[2]  张云勇,刘锦德.新一代开放系统及互操作性研究[J].系统工程与电子技术,2002,24(8):94-97.ZHANG Yun-yong,LIU Jin-de.Study on next generationopen system and its interoperability[J].SystemsEngineering and Electronics,2002,24(8):94-97.(inChinese)
[3]  孙玉方.开放系统的国际标准化[J].计算机工程与应用,1994(5):27-31.SUN Yu-fang.Open system of the international standard[J].Computer Engineering and Applications,1994(5):27-31.(in Chinese)
[4]  王怀民.开放系统的概念[J].计算机工程与科学,1995(3):105-113.WANG Huai-min.The concept of open systems[J].Computer Engineering&Science,1995(3):105-113.(in Chinese)
[5]  胡贯荣,刘键.开放系统技术的探讨[J].计算机工程与设计,1995,16(3):37-40.HU Guan-rong,LIU Jian.Research on open system[J].Comouter Engineering and Design,1995,16(3):37-40.(in Chinese)
[6]  REN Shang-ping,YU Yue,CHEN Nian-en,et al.Actotrs,roles and coordinators:a coordination model foropen distributed and embedded systems[C]∥8thInternational Conference on Coordination Models andLanguages,Bologna,June 14-16,2006:247-265.
[7]  张继军.通信服务质量术语与通用QOS模型[J].光通信研究,2004,3:33-35.ZHANG Ji-jun.Quality of service terminology incommunication network and the general QOS model[J].Study on Optical Communications,2004,3:33-35.(inChinese)
[8]  宋普选,应锦鑫.入侵检测技术研究综述[J].军民两用技术与产品,2005,7(7):38-40.SONG Pu-xuan,YING Jin-xin.A summary of intrusiondetection technology[J].Aerospace Technology andCivilian Products,2005,7(7):38-40.(in Chinese)
[9]  杨智君,田地,马骏骁,等.入侵检测技术研究综述[J].计算机工程与设计,2006,27(12):2119-2123.YANG Zhi-jun,TIAN Di,MA Jun-xiao,et al.Survey ofintrusion detection technology[J].Comouter Engineeringand Design,2006,27(12):2119-2123.(in Chinese)
[10]  LEE S C,HEINBUCH D V.Training a neural-networkbased intrusion detector to recognize novel attacks[J].IEEE Transactions on Systems,Man and Cybernetics:Part A,2001,31(4):294-299.
[11]  SANDHU R S,COYNE E J,FEINSTEIN H L,et al.Role-based access control models[J].Computer,1996,29(2):38-47.
[12]  张可翔,谢冬青,冷健.一种基于属性证书和角色的访问控制模型[J].微电子学与计算机,2006,23(11):143-148.ZHANG Ke-xiang,XIE Dong-qing,LENG Jian.Therole-based access coontrol via attribute certificate[J].Microelectronics&Computer,2006,23(11):143-148.(in Chinese)
[13]  吴江栋,李伟华,安喜锋.基于RBAC的细粒度访问控制方法[J].计算机工程,2008,34(20):52-54.WU Jiang-dong,LI Wei-hua,AN Xi-feng.Method offinely granular access control based on RBAC[J].Comouter Engineering,2008,34(20):52-54.(inChinese)
[14]  黄建,卿斯汉,魏丕会.基于角色的访问控制[J].计算机工程与应用,2003(28):64-66.HUANG Jian,QING Si-han,WEI Pi-hui.Role basedaccess control[J].Computer Engineering andApplications,2003(28):64-66.(in Chinese)
[15]  杨亚平,李伟琴,刘怀宇.基于角色的细粒度访问控制系统的研究与实现[J].北京航空航天大学学报,2001,27(2):178-181.YANG Ya-ping,LI Wei-qin,LIU Huai-yu.Research andimplementation of role based access control system[J].Journal of Beijing University of Aeronautics andAstronautics,2001,27(2):178-181.(in Chinese)
[16]  KWIAT K,REN Shang-ping.A coordination model forimproving software system attack-tolerance andsurvivability in open hostile environments[C]∥IEEEInternational Conference on Sensor Network,Ubiquitous,and Trustworthy Computing,Taiwan,June 5-7,2006:1-9.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133