Font Size: a A A

The Checkpointing Technology And Realization Of Computer Immunology System GECISM

Posted on:2006-10-26Degree:MasterType:Thesis
Country:ChinaCandidate:S Y YangFull Text:PDF
GTID:2168360155950331Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
It becomes a very new method in research field that people get inspiration from the natural to solve the science problem, research the rules of the natural and in the end solve the problem that people faced. After studying the mechanism of the biologic immune system and referring the returns of computer immune system at home and abroad, the computer immune system model based on system call is put forward. In this model, some traits of the biologic immune system are utilizing to distinguish non-self from self, eliminate non-self and provide a frame for adjusting the intensity of self-response. And based on this, an autonomic and self-adapting information safety system is constructed. It can monitor the processes real-time by dynamic analytic mechanism and give the alarm in good time, which effectively compensates the shortage of the other static tools. This paper recommends checkpointing mechanism and expounds chekpointing accordance algorithms. This paper applies checkpointing to achieve the rollback backup and restarting of the process by reserving and restarting the process context ,the system context and something relevant with the process running, for example the states of the opening papers and the environment relevant with the mainframe states.And the paper expounds some kinds of ways to improve the efficiency of the checkpointing and the realization of the checkpointing under user level in the Linux.
Keywords/Search Tags:Computer Immune, Rolback, Checkpointing, Network security
PDF Full Text Request
Related items