Font Size: a A A

Research Of Intrusion Tolerance Middleware Platform And Key Technologies Based On J2EE

Posted on:2009-10-25Degree:MasterType:Thesis
Country:ChinaCandidate:L PengFull Text:PDF
GTID:2178360278480767Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of information technology, people enjoy the convenience brought about by facilitating, security has become the focus of attention of the people at the same time. Firewall and intrusion detection technology can not solve all safty problems. Intrusion-tolerant think attack that occurred is not able to stop the completely .Intrusion-tolerance technology stress that system maintain confidentiality, data integrity, service continuity under the circumstances of the invasion through intrusion-tolerance service triggered by the invasion triggerThe application based on J2EE architecture more and more extensively used at present, J2EE will make development easier and more quickly , and has maintainability etc. J2EE server also has its own security strategy, such as: access control, authentication, data signatures etc. The combination of intrusion tolerance and J2EE provide customers high-reliability, high-confidentiality, persistent Web services,that is a promising issue currently .The article study mainly include the following aspects:First, proposed a J2EE intrusion-tolerance middleware model based on the interceptor's, proposed intrusion-tolerance framework which logically divided into intrusion-tolerance service providers modules and service management modules in the framework, it embody the flexibility.Secondly, according to intrusion-tolerance J2EE middleware model design, design the service-oriented intrusion-tolerance service, respectively server and client design through interceptor,JMX and MBean,and design the dynamic load of the class througn Java class load mechanism.Third, designed the replication algorithm based on framework. But there are the problem of request re-implementation and inconsistency state of the server when the server collapse, for the reason we design the replication algorithm based on the framework to solve these problem, and the framework can make any replication algorithm be deployed in the system, as long as the replication algorithm to meet the interface specification of framework. In the end, the replication algorithm was tested and compared with the JBoss's own replication algorithm.Fourth, designed a client-based dynamic load balancing strategy, cliend-based load balancing strategy has many advantages, such as: failover to the other server,and other advantages is no single point of failure. In the end ,client-based load balancing strategy efficiency of is tested and compared with JBoss replication algorithm.
Keywords/Search Tags:Intrusion tolerance, J2EE, Interceptor, Framework, Replication algorithm, Load Balance
PDF Full Text Request
Related items