Research on the Intrusion Tolerant System Based on IPv6

Article Preview

Abstract:

with the rapid development of information technology especially Ipv6, people become more and more dependent on internet and some related applications. yet some security intrusion vary from minor mischief for pleasure, denial of service, and criminal intent for stealing or destroying still threat the security of information system which provides service online. Traditional researches on intrusion tolerant mainly focus on Ipv4, which cannot satisfy the requirement of Ipv6. Regarding this problem, the architecture of intrusion tolerant system based on Ipv6 is designed and some critical modules are improved accordingly, the workflow of the system is described in detail. The validity of the system is proven by the result of simulation experiment.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 765-767)

Pages:

1648-1652

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] . Yin, L. -H. and B. -X. Fang, Security attributes analysis for intrusion tolerant systems[J]. Jisuanji Xuebao/Chinese Journal of Computers, 2006. 29(8): pp.1505-1512.

Google Scholar

[2] . Gong, F.M., G. Katerina, and F.Y. Wang. . Characterizing Intrusion Tolerant Systems Using A State Transition Model. [EB/OL]. http: /www. anr. mcnc. org/projects/SITAR/papers/darpa00. pdf, (2000).

Google Scholar

[3] . Qin, H. -W., Y. -W. Dai, and Z. -Q. Wang, Model of intrusion tolerant system based on improved neural networks[J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2008. 32(5): pp.628-631.

Google Scholar

[4] . Lin, J., J. Jing, and P. Liu, Evaluating Intrusion-Tolerant Certification Authority Systems[J].

Google Scholar

[5] . Qin, H. -W., Y. -W. Dai, and Z. -Q. Wang, Model of distributed intrusion tolerant system based on Petri net[J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2009. 31(1): pp.208-212.

Google Scholar

[6] . Lin, J., J. Jing, and P. Liu. A framework for intrusion tolerant certification authority system evaluation[C]. 2007. Beijing, China: Inst. of Elec. and Elec. Eng. Computer Society.

Google Scholar

[7] . Qin, H., Y. Dai, and Z. Wang. Optimal redundancy calculation of self-cleansing intrusion tolerant system[C]. 2009. Guiyang, Guizhou, China: IEEE Computer Society.

DOI: 10.1109/icnds.2009.35

Google Scholar