{"title":"基于分层彩色petri网的入侵容忍动态取证系统","authors":"Hsing-Chung Chen, Jai-Zong Sun, Z. Wu","doi":"10.1109/BWCCA.2010.151","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by using Hierarchical Fuzzy Coloured Petri-Nets (HFCPNs), which is utilized to analyze the risk level of the traffic packets received from real server. We improve the intrusion tolerance mechanism [6] by using the HFCPNs. When the server is under some threats of intrusion, the malicious packets can be detected by the DFS, and will redirect them to shadow server. By way of using the Coloured Petri Nets and depending on the operator’s experience of fuzzy control, we support more detail design for DFS which can detect more malicious threats than [6]. Therefore, the design of transition will be more flexible for preventing various malicious threats in the DFS.","PeriodicalId":196401,"journal":{"name":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","volume":"167 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Dynamic Forensics System with Intrusion Tolerance Based on Hierarchical Coloured Petri-nets\",\"authors\":\"Hsing-Chung Chen, Jai-Zong Sun, Z. Wu\",\"doi\":\"10.1109/BWCCA.2010.151\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by using Hierarchical Fuzzy Coloured Petri-Nets (HFCPNs), which is utilized to analyze the risk level of the traffic packets received from real server. We improve the intrusion tolerance mechanism [6] by using the HFCPNs. When the server is under some threats of intrusion, the malicious packets can be detected by the DFS, and will redirect them to shadow server. By way of using the Coloured Petri Nets and depending on the operator’s experience of fuzzy control, we support more detail design for DFS which can detect more malicious threats than [6]. Therefore, the design of transition will be more flexible for preventing various malicious threats in the DFS.\",\"PeriodicalId\":196401,\"journal\":{\"name\":\"2010 International Conference on Broadband, Wireless Computing, Communication and Applications\",\"volume\":\"167 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Broadband, Wireless Computing, Communication and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BWCCA.2010.151\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Broadband, Wireless Computing, Communication and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BWCCA.2010.151","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Dynamic Forensics System with Intrusion Tolerance Based on Hierarchical Coloured Petri-nets
In this paper, we propose a dynamic forensics system (DFS) with intrusion tolerance by using Hierarchical Fuzzy Coloured Petri-Nets (HFCPNs), which is utilized to analyze the risk level of the traffic packets received from real server. We improve the intrusion tolerance mechanism [6] by using the HFCPNs. When the server is under some threats of intrusion, the malicious packets can be detected by the DFS, and will redirect them to shadow server. By way of using the Coloured Petri Nets and depending on the operator’s experience of fuzzy control, we support more detail design for DFS which can detect more malicious threats than [6]. Therefore, the design of transition will be more flexible for preventing various malicious threats in the DFS.