Study on a Website Protection Strategy Based on Network Survivability with Effective Web Materials System

Article Preview

Abstract:

Through the research on the network survivability, this paper proposes a website protection strategy based on network survivability from the angle of fine management, in which the paper makes the website server to ensure uninterrupted service under attack and improve the stability of network operation. At the same time this paper proposes a framework for website protection from the perspective of data protection and file protection in order to achieve network survivability. Finally, in accordance with the proposed protection system architecture and strategy, this paper builds the network environment and emulation of illegal attacks, the experiment results show that this strategy can protect the stable operation of the website, and the survivability of website can be reflected.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

814-817

Citation:

Online since:

June 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Weis S A, Sarma S E, Rivest R L, et al. Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems [C] / Proc. of the 1st International Conference on Security in Pervasive Computing. Berlin, Germany: Springer-Verlag, 2004: 206-210.

DOI: 10.1007/978-3-540-39881-3_18

Google Scholar

[2] Wang H Q, Liu D X, et a1. A holistic approach to survivable distributed information system for critical applications[C]. In: The Proc. of ISPA'2005, Naming, China, Published in Springer's Lecture Notes in Computer Science, LNCs 3758. 2005: 718-722.

Google Scholar

[3] DEEP M, DAVID T. Multi-layered network survivability-models, analysis, architecture, framework and implementation: an overview[C]/ Proceedings of the 2000 DARPA Information Survivability Conference &Exposition, 2000: 176-185.

DOI: 10.1109/discex.2000.824977

Google Scholar

[4] LUCIA C, BOUDEWIJN R H. Model checking for survivability[C]/ Proceedings of the Second International Conference on the Quantitative Evaluation of Systems (QEST'05), 2005: 148-152.

DOI: 10.1109/qest.2005.21

Google Scholar

[5] CASEY F, CHEN YI LIANG, et al. Survivability analysis of distributed systems using attack tree methodology[C]/ Military Communications Conference, 2005: 585-589.

DOI: 10.1109/milcom.2005.1605745

Google Scholar

[6] S.D. Moitra, etc. A Simulation Model for Managing Survivability of Network Systems. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2000: 316-317.

Google Scholar

[7] H.F. Mission Lipson. Survivability-A New Security Paradigm for Protecting Highly Distributed Critical Systems. Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, (2000).

Google Scholar

[8] K. Sullivan, J. Knight, etc. Information Survivability Control Systems. Proceedings: 215' International Conference on Software Engineering, IEEE Computer Society Press, Los Alamitos, CA, (1999).

Google Scholar

[9] Linger R C. Life-Cycle Models for Survivable Systems[R]. Pittsburgh: Software Engineering Institute, Carnegie Mellon University, (2002).

Google Scholar