Font Size: a A A

Research On Key Technologies Of Self-Adaptation For Survivability Of Network Information System

Posted on:2019-04-28Degree:MasterType:Thesis
Institution:UniversityCandidate:Shaikh Faryal RashidFull Text:PDF
GTID:2428330548494588Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Due to the rapid development of Computer science and technology has made the network increasingly complicated and diversified,which brought great new challenges to the security management of network and information system.The single use of "detection","tolerance" network and information technology was difficult to guarantee that the network run in an intrusion free state.In order to decrease the damages generated by network attacks as much as possible,a technical strategy that could help network management to grasp the current security situation of the network and could understand the future evolution trend of the security situation and respond in a timely and comprehensive manner to ensure system?s reliability and survivability.The concept of network security gradually aroused the interest of researchers,and they hoped to use it to solve the above demand.However,the research on the network security survivability and intrusion tolerance is still in the exploration stage,and the ability of building secure,enabling a system to tolerate subtle attacks,guaranteeing data integrity servers is becoming increasingly an unattainable goal.To capture the essence of survivability,we must first consider that intrusion is,in fact,a malicious fault that has two underlying causes: weakness,flaw,or vulnerability or a malicious attack or act that attempt to exploit former.Therefore in this paper many threats and problems have been outlined and evaluated as a set of operating systems and applications that intrusion tolerance,recovery(selfrestoration)method is usually the only viable way of improving the system?s dependability and security in the presence of continuously evolving threats.“Intrusion Prediction” “Intrusion Detection” “Attack Resistance” and “System Recovery” are the major technology used for protecting information system.This research presents survival approach for attacks from Web Services and other means.The tentative research shows that the proposed approach results in better performance of System,as well as increasing the capacity of diagnosing and reducing the service unavailability during an intrusion,because survivability is overall known as an approach to complete its mission in timely manner even in critical condition and in presence of intrusion or attack.This defense mechanism focuses on detect,prevent,tolerate and response,the attack symptoms as well as diagnosis of intrusion effects in order to perform a proper reaction only if attack succeeds.The research on survivability techniques in this paper focuses in providing a good level of services,even when the system is partially compromised.This research approaches to premise that a system?s architecture can ensure intrusion tolerance and meet the requirements of users.Overall,this work mainly elaborates the key problems of survivability research and its techniques.
Keywords/Search Tags:self-adaptation, survivability, information system, intrusion tolerance
PDF Full Text Request
Related items