Font Size: a A A

Research On Model And Evaluation Strategy Of Autonomic Intrusion Tolerance

Posted on:2013-02-01Degree:MasterType:Thesis
Country:ChinaCandidate:B LiuFull Text:PDF
GTID:2248330362971306Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
As the growing complexity of computer systems and the growing variety ofintrusion, traditional intrusion tolerant system is due to lack of self-adaptive andself-management capabilities, making it impossible to meet the increasingly complexsystems security requirements. So we must find new ways and means, withoutincreasing system complexity while addressing the system of self-adaptive andself-management features, and autonomic computing ideas put forward to solve thisproblem provides a new research direction.This paper presents the use of autonomic computing technology, self-managementfeatures, design an automatic, flexible and does not increase the complexity of the newintrusion tolerant systems: autonomic intrusion tolerant system, the attempt bybuilding autonomic intrusion tolerant system model and system and its key attributessurvivability evaluation studies for the study of intrusion tolerant systems provide anew way of thinking and perspective. This research work includes the followingaspects:(1) First introduce the basic theory of intrusion tolerance and related technologies,analysis the properties and structural of autonomic computing technology, based onautonomic computing technology will be combined with intrusion tolerance, putforward the concept of autonomic intrusion tolerance and analysis the key attributes ofautonomic intrusion tolerant: autonomic tolerance, autonomic recovery and autonomicdestruction.(2) Based on autonomic computing, investigate model structure and the module’sconstruction and implementation of autonomic intrusion tolerant system. The mainbuilding system model consists of three modules: autonomic control module,autonomic detection and autonomic intrusion module. The autonomic control modules are given the establishment method, organizational structure and working mechanismof autonomic elements; The autonomic detection module, based on Bayesian networks,gives a form of intrusion of the unknown suspect assessment methods in order toprovide the basis for intrusion tolerance; The autonomic intrusion module, accordingto the degree of risk for intrusion, design the three sub-modules of intrusion tolerance:autonomic tolerance module, autonomic recovery module and autonomic destructionmodule.(3) Research on survivability evaluation of autonomic intrusion tolerant systemand its key attributes, it is help determine the impact on system survivability factors, inorder to verify the system reliability and security and reduce system vulnerabilities andimprove system survivability. This paper presents a survivability evaluation indexbased on the definition and quantification of autonomic intrusion tolerant system,design a survivability evaluation model and solve the model weights by AHP (AnalyticHierarchy Process). Finally, analysis the survivability situation of system by a simplesimulation experiment and verify the feasibility of the survivability evaluation method.
Keywords/Search Tags:Intrusion Tolerance, Autonomic computing, Autonomic IntrusionTolerance, AHP, Survivability Evaluation
PDF Full Text Request
Related items