首页 | 官方网站   微博 | 高级检索  
     

入侵容忍系统及其关键机制
引用本文:苏忠,赖建荣,于斌,赵飞.入侵容忍系统及其关键机制[J].信息网络安全,2012(5):78-80.
作者姓名:苏忠  赖建荣  于斌  赵飞
作者单位:1. 空军指挥学院网络中心,北京,100097
2. 武汉科技大学城市学院信息工程学部,湖北武汉,430083
基金项目:国家自然科学基金项目[61071065]
摘    要:入侵容忍关注信息网络在受到攻击或破坏时如何保持能够提供连续不间断系统服务的问题。入侵容忍系统是信息网络安全防护体系极其重要的组成部分。文章介绍了入侵容忍系统的三个子系统:服务调度和监控子系统主要用于调度和监控关键服务器群;信息多元管理和存储子系统主要用于对关键信息的多元性分割、存储和集成;报警信息聚合和关联子系统主要实现对传统安全数据信息的聚合和关联。还介绍用于实现入侵容忍系统的四个关键机制,以及入侵容忍系统的实践应用。

关 键 词:入侵容忍  冗余  多样化  聚合  关联

Intrusion Tolerant System and the Key Mechanisms
SU Zhong , LAI Jiang-rong , YU Bin , ZHAO Fei.Intrusion Tolerant System and the Key Mechanisms[J].Netinfo Security,2012(5):78-80.
Authors:SU Zhong  LAI Jiang-rong  YU Bin  ZHAO Fei
Affiliation:2 ( 1. Network Centre, Air Force Command College, Beijing 100097, China; 2. Wuhan University of Science and Technology City College, Wuhan Hubei 430083, China )
Abstract:Intrusion Tolerance focus on remaining and providing continual network service even in the presence of attacks or intrusions. Intrusion Tolerant System is the one of important component for the network security architecture. We introduce three sub-system of Intrusion Tolerant System: the service schedule and surveillance sub-system is used to allocate and monitor the key application server group; the information diversity management and storage sub-system is used to diversify, store and integrate the key data information; the alarm information aggregation and correlation sub-system is used to aggregate and correlate the classical secure information. Four key mechanisms which is use to implement the Intrusion Tolerant System are also proposed. Finally, the practical implement of Intrusion Tolerant System is discussed.
Keywords:intrusion tolerance  redundancy  diversity  aggregation  correlation
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号