J4

• Original Articles • Previous Articles    

Proactive recovery algorithm in the distributed intrusion-tolerance system

ZHOU Hua;MENG Xiang-ru;ZHANG Li;QIAO Xiang-dong
  

  1. (The Telecommunication Eng. Inst., Air Force Eng. Univ., Xidian Univ., Xi’an 710077, China)
  • Received:2008-08-20 Revised:1900-01-01 Online:2009-04-20 Published:2009-05-23
  • Contact: ZHOU Hua E-mail:zhoumiaomiao_2005@126.com

Abstract: According to the fact that the intrusions can corrupt the safety of system resources, the concept of resource-safe is proposed and a proactive recovery algorithm is implemented in the component of the trusted timely computing base. In order to achieve the intrusion tolerance, the algorithm recovers every node in the system periodically to eliminate the influence of intrusions. The simulation experiment shows that the system unavailability is closely relative to system parameters, and that its results could be useful references to configure and evaluate the intrusion tolerance system.

Key words: intrusion tolerance, distributed system, proactive recovery, resource-safety, network security

CLC Number: 

  • TP309.2