Adaptive Hierarchical Intrusion Tolerant Model Based on Autonomic Computing

Bingyang Li, Huiqiang Wang, Guangsheng Feng
{"title":"Adaptive Hierarchical Intrusion Tolerant Model Based on Autonomic Computing","authors":"Bingyang Li, Huiqiang Wang, Guangsheng Feng","doi":"10.1109/SECTECH.2008.24","DOIUrl":null,"url":null,"abstract":"Intrusion tolerance has been a key technology of system survivability. Aiming at the absence of self-adaptation ability and quantitative analysis on existent intrusion tolerant system, an adaptive hierarchy intrusion tolerant system based on autonomic computing (AHITAC, for short) is proposed. Adopting hierarchy modes, the critical modules of AHITAC include confidence evaluation of accessing, active trapping on suspicious information, hierarchical learning of applications and classed recovery of system function. By autonomic implementing the learning and adaptive function of confidence threshold, service classification and trap repository, AHITAC implements the tolerance on intrusion and suspicious information, improving the ability of self-recovery and self-optimization on object network. The simulation results show that the object network with AHITAC is stable and tolerant.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 International Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECTECH.2008.24","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Intrusion tolerance has been a key technology of system survivability. Aiming at the absence of self-adaptation ability and quantitative analysis on existent intrusion tolerant system, an adaptive hierarchy intrusion tolerant system based on autonomic computing (AHITAC, for short) is proposed. Adopting hierarchy modes, the critical modules of AHITAC include confidence evaluation of accessing, active trapping on suspicious information, hierarchical learning of applications and classed recovery of system function. By autonomic implementing the learning and adaptive function of confidence threshold, service classification and trap repository, AHITAC implements the tolerance on intrusion and suspicious information, improving the ability of self-recovery and self-optimization on object network. The simulation results show that the object network with AHITAC is stable and tolerant.
基于自主计算的自适应分层入侵容忍模型
入侵容忍已经成为系统生存能力的关键技术之一。针对现有入侵容忍系统缺乏自适应能力的问题,通过对现有系统的定量分析,提出了一种基于自主计算的自适应分层入侵容忍系统(AHITAC)。AHITAC采用分层模式,关键模块包括访问置信度评估、可疑信息主动捕获、应用分层学习和系统功能分类恢复。AHITAC通过自主实现置信度阈值、服务分类和陷阱库的学习和自适应功能,实现了对入侵和可疑信息的容忍度,提高了对象网络的自恢复和自优化能力。仿真结果表明,采用AHITAC的目标网络具有稳定性和容错性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信