首页 | 本学科首页   官方微博 | 高级检索  
     

入侵容忍常见实现技术研究
引用本文:龚榆桐,翁国秀. 入侵容忍常见实现技术研究[J]. 玉林师范学院学报, 2011, 0(5): 152-156
作者姓名:龚榆桐  翁国秀
作者单位:玉林师范学院数学与信息科学学院;玉林师范学院实验设备处;
摘    要:入侵容忍技术是一种融合了密码技术、容错技术等的全新网络安全技术,它突出强调当系统在受到攻击时,即使系统的某些部分己经受到破坏、或者某些部分已经受到攻击者的控制时,整个系统仍然能够保证服务的可用性和数据的秘密性、完整性,保证系统关键功能的运行,从而仍然能够对外继续提供正常或降级的服务.文中介绍了在入侵容忍领域里常用的基本技术:冗余技术、多样性技术、沙盒技术、复制技术、门限方案、恢复策略、群组通信系统等.

关 键 词:入侵容忍  冗余  沙盒  群组通信系统

Research of Implementation Technology in Intrusion Tolerance
GONG Yu-tong,WENG Guo-xiu. Research of Implementation Technology in Intrusion Tolerance[J]. Journal of Yulin Teachers College, 2011, 0(5): 152-156
Authors:GONG Yu-tong  WENG Guo-xiu
Affiliation:GONG Yu-tong1,WENG Guo-xiu2(1.School of Mathematics and Information Science,Yulin Normal University,Yulin,Guangxi 537000,2.Dept.of Experimental Facility,Guangxi 537000)
Abstract:Intrusion tolerance technology is a new network security technology containing the cryptographic techniques,fault-tolerant technology.It highlights that,when the system is attacked,or some parts of the system have been damaged,or certain parts of the system have been controlled by attackers,the whole system will still be able to guarantee its service availability,data confidentiality,and integrity,and ensure key functions of the system can still operate,thus make it continue to provide external services in ...
Keywords:intrusion tolerance  redundancy technology  sandbox technology  group communication system  
本文献已被 CNKI 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号