An Adaptive Intrusion Tolerance Model Based on Autonomic Computing

Article Preview

Abstract:

Intrusion tolerance has been a key technology of system survivability. To cope with the absence of self-adaptability on existent intrusion tolerance system, an intrusion tolerant model based on autonomic computing is proposed, in which the reliability of the network connection is analyzed in real time to generate the initial reliability by an autonomic feedback mechanism, and the classification between suspicious information and confident information is guaranteed for implementing the tolerance on suspicious connections through the dynamic reliability optimization. The simulation results show that the intrusion tolerant model with autonomic feedback mechanism is desirable for enhancing the system’s self-adaptive performance, making it highly promising for further study.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3259-3263

Citation:

Online since:

December 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Fraga J , Powell D. A fault and intrusion-tolerant file system. In: Proc. of the3rd Intl. Conf. on Computer Security, 1985. 203-218.

Google Scholar

[2] QIN Hua-wang, DAI Yue-wei, WANG Zhi-quan. Model of Intrusion Tolerant System Based on Improved Neural Networks. Journal of Nanjing University of Science and Technology (Natural Science) Vol. 32(2008), pp.628-631.

Google Scholar

[3] GUO Shi-ze, NIU Guan-jie, ZHENG Kang-feng. An Intrusion Tolerance Model and Quantizing Analysis. Journal of Beijing University of Posts and Telecom. Vol. 30(2007), pp.36-39.

Google Scholar

[4] Bingyang Li, Huiqiang Wang, Guangsheng Feng. Adaptive Hierarchical Intrusion Tolerant Model Based on Autonomic Computing. 2008 International Conference on Security Technology, 137-141.

DOI: 10.1109/sectech.2008.24

Google Scholar

[5] LIAO Bei-shui, LI Shi-jian, YAO Yuan, GAO Ji. Conceptual Model and Realization Methods of Autonomic Computing. Journal of Software Vol. 19(2008), pp.779-802.

DOI: 10.3724/sp.j.1001.2008.00779

Google Scholar

[6] JING Ji-wu, FENG Deng-guo. An Intrusion Tolerant CA Scheme. Journal of Software Vol. 13(2002), pp.1417-1422.

Google Scholar

[7] CUI Jing-song, WANG Li-na, ZHANG Huan-guo, FU Jian-ming. A Parallel Model of Intrusion Tolerance System: RC Model. Chinese Journal of Computers Vol. 27(2004), pp.500-506.

Google Scholar

[8] YIN Li-hua, FANG Bin-xing. Security Attributes Analysis for Intrusion Tolerant Systems. Chinese Journal of Computers Vol. 29(2006), pp.1505-1512.

Google Scholar