Font Size: a A A

Research On Key Technologies For Network Survivability

Posted on:2007-01-26Degree:MasterType:Thesis
Country:ChinaCandidate:G S ZhaoFull Text:PDF
GTID:2178360185466365Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Network Survivability breaks limits of traditional network security concepts, and emphasizes the abilities of network and information systems on finishing their key services in a timely manner, even when attacks, faults, or accidents. Main idea of survivability is that the systems can achieve their key services punctually, and timely recovery the damaged services, even then intrusions succeed or the main components are damaged or destroyed. Network survivability has become a new direction of studies on network security.Firstly, this dissertation studies the interrelated domains of network survivability, including research status quo, research significances, formalized definition, developing trends, SSA analysis methods, etc, which builds a systematic theory framework of studies on network survivability. Secondly, under the direct of these theories discussed above, this dissertation analyses some the existing techniques for survivability, and that proposes two new methods for survivability-enhanced technique and evaluation respectively. At last, we summarize this paper, and propose the research plan for next step.Based on central limit theorem and hypothesis testing theory, this dissertation proposes an autonomous configuration algorithm which is a survivability-enhanced technique. Through analyzing the relationship between the current response time of key service and its confidence interval, the algorithm may dynamically take the policies of resource re-configuration, service degradation and service roaming mechanism. Moreover, the whole configuration process is transparent to user. Finally, simulation experiments show that the proposed method can obviously improve the survivability of network system.
Keywords/Search Tags:Network Survivability, Resource Preemption, Key Service, Autonomous Configuration
PDF Full Text Request
Related items