Font Size: a A A

Research Of Reputation-based For Host Intrusion Prevention System

Posted on:2011-09-13Degree:MasterType:Thesis
Country:ChinaCandidate:S Y LiuFull Text:PDF
GTID:2178330338978241Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of network technology, computer network is increasingly widespread deep into all areas of daily life, and gradually changing the social behavior and appearance. However, computer network security issues become increasingly prominent. Intrusion Prevention System is another security technology that is following the Intrusion detection system. Intrusion prevention system could be more intelligent initiative, and keep your computer networks or systems again sting the latest viruses and unknown types of malicious attacks.For host-based intrusion prevention system dynamics, this paper is based access control module, the main research work include the following:1. Analysis of the technical characteristics of several typical principle access control model, DAC, MAC and RBAC. Combining with the dynamic of the system, the reputation of role-based access control model is proposed. The model is based on the RABC96 model that introduced the concept of reputation. It refines the resource access constraints. User access request meets the constraints to change the user's reputation.2. Model reputation in the calculation: that distributes the added value of user reputation that based on users to success access of record history. Constraints in access control module can be set up different weights. The users'request information is compared with the constraints; under the constraints of different weights have different degrees effect on the reputation of users.3. For different users (mainly the high reputation users) of the improper access, this model proposes the "dynamic variables reputation" concept, which is according to the user dynamically adjust the size of dynamic reputation. Comparing with the traditional role of the access control models, this mechanism specifies the conditions for access control, according to the user reputation value, automatically adjust user roles.4. In order to prevent unauthorized users to enhance reputation in the short term, the concept of "limited reputation modified" concept is proposed. It limits the reputation of the illegal users to upgrade.Finally, the article simulates the reputation of role-based access control module, using constraints rule to compute reputation, enabling users to access the dynamic changes in the rules to test the feasibility of the module.
Keywords/Search Tags:Intrusion Detection System, Intrusion Prevention System, Access Control, Reputation
PDF Full Text Request
Related items