首页 | 本学科首页   官方微博 | 高级检索  
     检索      

Building Intrusion Tolerant Software System
作者姓名:PENGWen-ling  WANGLi-na  ZHANGHuan-guo  CHENWei
作者单位:[1]SchoolofComputer,WuhanUniversity,Wuhan430072,Hubei,China//NetworkCenter,GannanTeachersCollege,Ganzhou341000,Jiangxi,China [2]SchoolofComputer,WuhanUniversity,Wuhan430072,Hubei,China
基金项目:Supported by the National Natural Science Foun dation of China (90104005,60373087, 60473023),the Ph. D Pro grams Foundation of Ministry of Education of China(20020486046)
摘    要:In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting the inherent security vulnerabilities. We present some intrusion tolerance technology by exploiting N-version module threshold method in con-structing multilevel secure software architecture, by detecting with hash value, by placing an ““““““““antigen““““““““ word next to the return address on the stack that is similar to human immune system, and by adding ““““““““Honey code““““““““ nonfunctional code to disturb intruder, so that the security and the availability of the software system are ensured.

关 键 词:侵入容许技术  软件系统  免疫代码  网络入侵  计算机安全
收稿时间:18 May 2004

Building intrusion tolerant software system
PENGWen-ling WANGLi-na ZHANGHuan-guo CHENWei.Building Intrusion Tolerant Software System[J].Wuhan University Journal of Natural Sciences,2005,10(1):47-50.
Authors:Peng Wen-ling  Wang Li-na  Zhang Huan-guo  Chen Wei
Institution:(1) School of Computer, Wuhan University, 430072 Wuhan, Hubei, China;(2) Network Center, Gannan Teachers College, 431000 Ganzhou, Jiangxi, China
Abstract:In this paper, we describe and analyze the hypothesis about intrusion tolerance software system, so that it can provide an intended server capability and deal with the impacts caused by the intruder exploiting the inherent security vulnerabilities. We present some intrusion tolerance technology by exploitingN-version module threshold method in constructing multilevel secure software architecture, by detecting with hash value, by placing an “antigen” word next to the return address on the stack that is similar to human immune system, and by adding “Honey code” nonfunctional code to disturb intruder, so that the security and the availability of the software system are ensured. Foundation item: Supported by the National Natural Science Foundiation of China (90104005, 60373087, 60473023), the Ph. D Programs Foundation of Ministry of Education of China (20020486046) Biography: PENG Wen-ling (1969-), male, Associate professor, Ph. D candidate, research direction: network security, network management.
Keywords:intrusion tolerant  immune code  Honey code  trusted computing  
本文献已被 CNKI 维普 万方数据 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号