Font Size: a A A

Research Of Key Servers' Survivablity In Network

Posted on:2007-07-14Degree:MasterType:Thesis
Country:ChinaCandidate:Y L DingFull Text:PDF
GTID:2178360185993120Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the development of Internet, computer crime is becoming more and more rampant. Many techniques such as Firewall, IDS (Intrusion Detection System), anti-virus softwares, VPN (Virtual Private Network), PKI (Pubilic Key Infrastructure), secure operation systems, secure Web servers and so on have ever held back the hack intrusions to some certain extent. Yet, it is more and more serious about the problems of information security. With more and more distributed applications of network, the attacks are inevitable. And more, it will become more and more acute due to the development of defence. So in a word, there is no server that is strong enough to resisit all the attacks in the world.Survivable systems-that is, systems that can continue to provide service despite of failures, intrusions, and other threats-are increasingly needed in a wide variety of civilian and military application fields. As computer systems become more complex and more widely distributed, it is becoming increasingly difficult to remove all vulnerabilities that can potentially be exploited by intruders or anonymous faults. In other words, the probability of intrusions and failures is higher than that of other environments. In that environment, intrusion fault-tolerance mechanism is a good solution to prevent failure of its operation. Intrusion fault-tolerance system is an emerging approach that aims to enable systems to continue functioning in spite of successful intrusions or unknown faults.In this paper, a model of key survivable servers is proposed. The model is based on the combination between surviavable techniques and key servers. Firstly we analyze the related fields of the network's surviavablity, which includes the background of the surviavability, the definition of the surviavability, the features of the surviavability, the fields that the surviavability can be applied in, the development of the surviavability, the realization of the surviavability and so on. The structure of the surviavability has been formulated. And then the model about key surviavable servers is proposed. At last we analyze the components of the model. Specifically, the main work of the paper includes:analyzing the research overview of surviavable technique home and...
Keywords/Search Tags:Network Security, Surviavability, Intrusion tolerant
PDF Full Text Request
Related items