{"title":"Adaptive Hierarchical Intrusion Tolerant Model Based on Autonomic Computing","authors":"Bingyang Li, Huiqiang Wang, Guangsheng Feng","doi":"10.1109/SECTECH.2008.24","DOIUrl":null,"url":null,"abstract":"Intrusion tolerance has been a key technology of system survivability. Aiming at the absence of self-adaptation ability and quantitative analysis on existent intrusion tolerant system, an adaptive hierarchy intrusion tolerant system based on autonomic computing (AHITAC, for short) is proposed. Adopting hierarchy modes, the critical modules of AHITAC include confidence evaluation of accessing, active trapping on suspicious information, hierarchical learning of applications and classed recovery of system function. By autonomic implementing the learning and adaptive function of confidence threshold, service classification and trap repository, AHITAC implements the tolerance on intrusion and suspicious information, improving the ability of self-recovery and self-optimization on object network. The simulation results show that the object network with AHITAC is stable and tolerant.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECTECH.2008.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Intrusion tolerance has been a key technology of system survivability. Aiming at the absence of self-adaptation ability and quantitative analysis on existent intrusion tolerant system, an adaptive hierarchy intrusion tolerant system based on autonomic computing (AHITAC, for short) is proposed. Adopting hierarchy modes, the critical modules of AHITAC include confidence evaluation of accessing, active trapping on suspicious information, hierarchical learning of applications and classed recovery of system function. By autonomic implementing the learning and adaptive function of confidence threshold, service classification and trap repository, AHITAC implements the tolerance on intrusion and suspicious information, improving the ability of self-recovery and self-optimization on object network. The simulation results show that the object network with AHITAC is stable and tolerant.