您现在的位置: 首页> 研究主题> 容忍入侵

容忍入侵

容忍入侵的相关文献在2003年到2018年内共计73篇,主要集中在自动化技术、计算机技术、无线电电子学、电信技术、经济学 等领域,其中期刊论文56篇、会议论文7篇、专利文献5694篇;相关期刊37种,包括郑州大学学报(理学版)、系统工程与电子技术、通信学报等; 相关会议5种,包括2010年中国通信国际会议、第27届中国数据库学术会议、第二届中国计算机网络与信息安全学术会议等;容忍入侵的相关文献由103位作者贡献,包括郭渊博、马建峰、刘伟等。

容忍入侵—发文量

期刊论文>

论文:56 占比:0.97%

会议论文>

论文:7 占比:0.12%

专利文献>

论文:5694 占比:98.91%

总计:5757篇

容忍入侵—发文趋势图

容忍入侵

-研究学者

  • 郭渊博
  • 马建峰
  • 刘伟
  • 袁顺
  • 周睿鹏
  • 张来顺
  • 郝耀辉
  • 王良民
  • 彭亮
  • 王亚弟
  • 期刊论文
  • 会议论文
  • 专利文献

搜索

排序:

年份

    • 李林峰; 孔祥营; 张振华
    • 摘要: In the TNC architecture,there are several limitations that limit the application scenario of the TNC architecture. Concerning the fact that the TNC architecture is lack of invasive treatment,this paper proposed a intrusion tolerant of redun-dant servers model and a design of security protocols within the servers group in order to improve the reliability of TNC archi-tecture,which still correctly complete the certification in the case of being attacked. Under the assumption that a secure server's signature couldn't be tampered with by a hacker,the model used a server cluster instead of a single point authentica-tion server. The server in the cluster completed the authentication synchronously and determined the scope of the secure serv-ers with several rounds of information exchange. Then the proxy server was elected by the secure servers. The proxy server delivered the final authentication results to the policy execution point. Security analysis and efficiency comparision with other protocals show that the model can significantly improve the reliability of trusted network connection architecture,and the time overhead can be accepted while completing security goals.%目前的TNC架构存在着多个方面的局限性,这些局限性限制了TNC架构的应用场景.针对TNC架构缺乏入侵处理的缺陷,为了提高TNC架构的可靠性,使其在被入侵的情况下依然正确地完成认证,提出了一种容忍入侵的冗余服务器模型并设计了服务器集群内部的安全协议.在安全的服务器无法被黑客篡改签名的密码学假设下,模型采用服务器集群替代单点认证服务器.集群里的服务器同步完成认证,并通过多轮信息交换确定安全服务器的范围,再由安全服务器协商选举出代表服务器.代表服务器将最终认证结果交付给接入执行点.安全性分析和效率分析比较表明,模型使可信网络接入架构的可靠性明显提高,在完成安全目标的同时产生的时间开销可以被接受.
    • 姬广永
    • 摘要: 针对无线网络中容忍入侵能力进行优化评估,在提高无线网络安全方面具有重要意义.由于无线网络具有开放性,使得存在网络入侵防御不全面.传统的建模方法主要根据无线网络中入侵种类进行分类,判断入侵形式,并进行入侵能力评估,评估过程中需添加大量的约束条件,导致评估建模不准确.提出基于改进层次化的无线网络中容忍入侵能力评估建模方法.改进方法先利用层次化算法组建无线网络安全态势模型,获取无线网络系统受到攻击影响的效果,利用攻击效果修正无线网络安全态势模型.通过对各个指标的定量计算组建了无线网络中容忍入侵能力评估模型.仿真结果证明,提出的方法提高了容忍入侵能力评估的准确性.
    • 刘风华; 米军利; 丁恩杰
    • 摘要: 为了防御代理盲签名方案中原始签名者的伪造攻击和签名接收者的伪造攻击,该文对签名算法进行了研究。该文基于新的( t,n)秘密共享机制将证书授权中心( Certificate authority, CA)私钥进行分存,使用其身份作为私钥份额的标识,提供私钥保护的容侵性。该方案不是从保护系统或检测入侵出发来保证CA的安全,而是确保当少数部件被攻击或占领后,CA系统的机密信息并没有暴露。研究结果表明:系统中即使一定数量的用户被恶意攻击者攻击后,系统仍可有效地运转。%To defend the forgery attacks of the original signer and signature receiver in the scheme of proxy blind signature,this paper studies the problem of the signature algorithm. Based on the new( t, n) secret sharing mechanism,the private key of the Certificate Authority( CA) is separately stored by using its identity as the mark of private key so that it can provide the intrusion tolerance for the securing Private Keys. Rather than preventing intrusions or attacks to ensure safety of CA,the project ensures that the confidential information of the CA system will not be exposed when a minority of components are attacked. The research results show that even if certain users are spitefully attacked, the system still works properly.
    • 米军利; 谢淑翠; 张建中
    • 摘要: CA private key is shared based on the new (t, n) secret sharing mechanism. It uses its identification as a share of the private key. Rather than prevent intrusions or detect them after the fact, the project ensures that the compromise of a few system components does not compromise the private key of the CA. These policies of intrusion tolerance, by adjusting the use of cryptographic protocol, and tolerating or preventing part of attacks, protect the safety of cryptographic protocol performance. The approach has realized the security and robustness for the key functions of a database system by using the integration security strategy and multiple security measures.%基于新的(t,n)秘密共享机制将CA私钥进行分存,使用其身份作为私钥份额的标识,提供私钥保护的容侵性.该协议不是从保护系统或检测入侵出发来保证CA的安全,而是确保当少数部件被攻击或占领后,CA系统的机密信息并没有暴露;能根据攻击的类型,动态调节密码协议的运行,以容忍、阻止一部分攻击行为,更好地保护密码协议的运行安全.协议采用系统整体安全策略,综合多种安全措施,实现了系统关键功能的安全性和健壮性.
    • 侯丽波
    • 摘要: 文章阐述了新一代网络防护可生存性的重要性,并对容忍入侵概念及功能做了介绍.文中引入容忍入侵的设计思想,采用冗余结构,实现系统即使被入侵或故障发生也能提供正常有效服务的容忍入侵的系统安全防护体系.
    • 王静宇; 王秀苹; 张晓琳
    • 摘要: 云计算是推动大规模、按需、动态计算发展的新兴技术.然而,云计算平台数据的容忍入侵性能仍有待提高.为了改进云计算平台的容忍入侵性能,研究基于拜占庭算法的容忍入侵技术,以Hadoop为平台实现了MinBFT和MinZyzzyva最小拜占庭算法原型.在对两种算法性能进行比较的基础上,改进了容忍入侵算法性能,实现了在2F+1个副本中容忍F个副本的错误;尽量减少内部通信资源开销和副本数量,降低云计算资源消耗,提高系统容忍入侵性能.
    • 赵辉; 房至一; 李万龙; 郑山红
    • 摘要: An intrusion tolerance system that provides self-adaptation and recovery ability is built based on failure detector and diverse redundancy technology, proposing the architecture of the system, and designing the failure detector algorithm for the intrusion-tolerance system. This system can distinguish node-level and service-level failure, taking different shielding measures and recovery strategies assuring the system be reconfigured in time after being attacked and intruded. The result of experiment shows that the failure detector algorithm can solve the wrong judgement problem caused by network latency and packet loss. The accuracy of detection is clearly improved.%为解决容忍入侵系统的自适应能力差和运行效率低等问题,将失效检测和多样化冗余技术相结合,构建具有自适应恢复能力的容忍入侵系统,给出了系统的体系结构,设计了适合于容侵系统的失效检测算法.系统可以区分节点级和服务级的失效,从而采取不同的屏蔽措施和恢复策略,保证系统在受到攻击和入侵后,及时对系统进行重配置.实验结果表明,笔者设计的失效检测算法能解决由于网络延迟和丢包造成的误判问题,检测的准确性明显提高.
    • 唐俊; 彭敏
    • 摘要: 数字证书的可信任性取决于数字签名本身的有效性.为增强数字签名的有效性,提出一种认证中心(CA)签名私钥可以容忍入侵的高安全性签名方案.使用RSA算法产生CA私钥,保证私钥的不可伪造性.基于新的(t,n)秘密共享机制将CA私钥进行分存,使用其身份作为私钥份额的标识,提供私钥保护的容侵性.在进行数字签名时,基于RSA签名本身的特性,设计一种无需重构CA私钥的分步签名方案,进一步增强CA私钥的高容侵性.通过仿真实验对(t,n)门限取值结果的影响进行验证,表明方案的有效性.%The validity of digital certificate depends on the digital signatures. To ensure the validity of digital signatures, a digital signature scheme with intrusion-tolerance private key is proposed. The Certificate Authority(CA) private key is generated using the RSA algorithm to ensure its un-forged. CA private key is shared based on the new (t, n) secret sharing mechanism. It uses its identification as a share of the private key.Furthermore, it is no need to reconstruct the CA private key to sign, so it enhances the security of CA private key. Theoretical analysis and experimental results show the effectiveness of the scheme.
    • 周睿鹏; 郭渊博; 刘伟
    • 摘要: 针对现有容忍入侵应用服务器在自治愈方面的不足,提出了一种面向容忍入侵的自治愈应用服务器的构建方法.在容忍入侵应用服务器的基础上,设计了自治愈功能组件,包括检测部件、管理部件和执行部件,将自治愈功能透明地加入到容忍入侵应用服务器中,解决了容忍入侵应用服务器中存在的隐性入侵、软件老化以及容侵前提条件易遭破坏的问题,进一步提高了容忍入侵应用服务器的可靠性和生存性.最后在项目组研发的容忍入侵应用服务器平台--JANTM中实现了对自治愈功能的支持.%Aiming at the current intrusion-tolerant application server' s limitation for self-healing, a method to design an intrusiontolerant oriented self-healing application server is proposed.By the way of establishing a self-healing functional components, including the detection components, management components and implementation components, we add self-healing capabilities into the intrusiontolerant application server.It solves some problems in the intrusion-tolerant application servers, for example the hidden intrusion,software aging, and the vulnerable prerequisite of intrusion tolerance, and further enhances the reliability and survivability of the intrusiontolerant application server.Finally, an intrusion-tolerant oriented self-healing application server is realized, JANTM is built (J2EE based adaptive intrusion tolerant middleware) which is developed by our project team.
    • 周睿鹏; 郭渊博; 刘伟; 韩磊磊
    • 摘要: Aiming at the limitation for intrusion-tolerant and self-healing, this paper presented a self-healing intrusiontolerant model based on J2EE application server, and presented an self-healing intrusion-tolerant method for this model. Compared with the traditional method, this method not only solved the limitation for intrusion-tolerant, for example,the hidden intrusion, software aging, and the vulnerable prerequisite of intrusion tolerance, but also solved the problem of intrusion in the self-healing. Finally, comparison tests of the self-healing intrusion tolerance clusters,JANTM clusters and JBoss4.0 clusters verify the self-healing intrusion tolerance method to make self-healing intrusion tolerance clusters higher reliability and survivability.%针对目前容忍入侵技术和软件自治愈技术的不足,在研究现有JANTM平台的基础上,提出了一种基于J2EE应用服务器的容侵自治愈模型,并在该模型下提出了一种容侵自治愈方法;和传统单一方法相比,该方法不仅解决了容忍入侵技术中存在的隐性入侵、软件老化以及容侵前提条件易遭破坏的问题,也改善了自治愈技术中未解决的外界入侵等问题;最后通过将容侵自治愈集群、JANTM集群和JBoss4.0集群进行比较测试,验证了该容侵自治愈方法可以使基于J2EE应用服务器的容侵自治愈集群有更高的可靠性和生存性.
  • 查看更多

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号