Font Size: a A A

On The Survivability Oriented Emergency Response And Incident Recovery Technique

Posted on:2004-10-17Degree:DoctorType:Dissertation
Country:ChinaCandidate:Z G HuangFull Text:PDF
GTID:1118360152957239Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The survivability technique is derived from the RAS (Reliability Availability and Serviceability). But with the extension to the info-war environment, many new features appear, such as the locality of the attacks to the attacked targets, the vulnerability of the homogeneous environment to the same attack, the invalidation of the rule of small probability events, the intelligence of the adversaries and extensive spreading of attack methods, etc. These features promote the requirement of new technologies, new methods and new policies for the survivability research, which are different from those of the RAS technique. The dissertation takes the requirement of emergency response and incident recovery as its research background, and focuses on the vulnerability of the homogeneous environment and the unpredictability of the attack behavior. The dissertation explores the key techniques and their implementations of the survivability enhancement of the network information system in info-war environment. The main contributions of the dissertation are as the follows:1. Proposing the SERIRT modelThe SERIRT (the Survivability based Emergency Response and Incident Recovery Technique) model starts from information security defense-in-depth architecture, and tries to find a way to enhance the survivability of a system in the emergency response and incident recovery phase. It constructs the diversity based redundant backup policy in the system construction phase, carries out the active tenure duty method (TDM) when the system is running, and provides rapid recovery after a failure.2. Proposing the diversity architecture theoretical model and its implementation caseIn the theoretical model, the dissertation concludes the concepts, the conclusions and the implementation techniques about diversity. It discusses the concept of the diversity survivability system, diversity space, diversity distance, etc. And it proposes the rules and the ways for the survivability technique design.Based on the theoretical model, the dissertation proposes, designs and implements a diversity based redundancy case, called distributed dynamic backup technique. This technique intends for the data survivability design of the SERIRT model and provides supports for the background recovery after an accident.3. Proposing, designing and implementing the TDM methodThe TDM method uses the idea of chief in duty rule for reference. It implements the active roaming mechanism which means that whether the tragedy comes or not, the network information service will keep in motion randomly in the spatio-temporal aspect. It intends for the service survivability design of the SERIRT model, and tries to be in fair weather preparing for foul and to deal with accident actively for special applications.The stochastic tenure mechanism implements the stochastic and autonomous algorithm mode in boundless network environment, and the mode has no central control and fine grain features. The mechanism makes the tenure of the service node unpredictable by assigning a random tenure to the node and thus changes the traditional lifetime service pattern. The service will actively roam to a new node when the tenure is over. When a disaster occurs it can withdraw the services from the disaster scene, and switch the impaired nodes to background for self-recovery and immunity.The Brawn motion mechanism implements a free competition mechanism among the nodes in the same backup pool for the election of the successive service node. The free competition mechanism realize a control mode for service migration without central control and thus avoids the possible survival risk caused by increasing the vitals of the system. The location of the successive service node is also unpredictable. And therefore it improves the concealment of the protected target.The proposed adaptive flexible protection technique includes two sides: the adaptive flexible TDM method combines together with the change of the factors of the service tenure, the degree of threat and the attack strength, and makes a good balance between...
Keywords/Search Tags:survivability, diversity, emergency response and disaster recovery, schedule algorism, TDM method, distributed dynamic backup
PDF Full Text Request
Related items