Font Size: a A A

Research Of Realization Approach For Intrusion Tolerant System Based On Combined Strategy

Posted on:2007-05-17Degree:MasterType:Thesis
Country:ChinaCandidate:Z J SunFull Text:PDF
GTID:2178360182491006Subject:Systems Engineering
Abstract/Summary:PDF Full Text Request
With the people's mind advancement and market competition intensifies, the traditional communication methods don't meet the demand of people.The widely application of Computer and Internet provides for the people the convenient , high-efficient,realtime communication way.The computer is used widely by people, meanwhile its security problems brings worries to people.The paper compares and expatiates the security technology on the current market aimed at the security problems those occurred in the computer application fields, We find that the security technology doesn't protect the system's safety absolutely from some attacks. Therefore based on the intrusion tolerant theory, the paper introduces a distributed log service model, This model adopted log partition technology to store the log information and Bayesian network to find the exception of accessing log data in order to construct a safe log service system;introduce based on combined stagegy file accessing model that adopted information distributed store technology , role-based access controll technology and cryptography technology, the main three technology collaborate with each other in order to protect the file data better;at last, the paper also introduces a Web service model, this model that uses Byzantine protocol and redundancy method can provide a service that can tolerant the Byzantine error that occured. When we design the system, if we think of the tolerant efficiency of any model's in advance, the tolerant efficiency of the whole system must be improved profoundly.The conclusion of this paper is realistic both in theory and in application for designing the computer application system, improving the system's intrusion tolerant efficient and intensifying the system's security.
Keywords/Search Tags:Intrusion Tolerant, Log Service, File Protecting, Web Service
PDF Full Text Request
Related items