J4
• Original Articles • Previous Articles
ZHOU Hua;MENG Xiang-ru;ZHANG Li;QIAO Xiang-dong
Received:
Revised:
Online:
Published:
Contact:
Abstract: According to the fact that the intrusions can corrupt the safety of system resources, the concept of resource-safe is proposed and a proactive recovery algorithm is implemented in the component of the trusted timely computing base. In order to achieve the intrusion tolerance, the algorithm recovers every node in the system periodically to eliminate the influence of intrusions. The simulation experiment shows that the system unavailability is closely relative to system parameters, and that its results could be useful references to configure and evaluate the intrusion tolerance system.
Key words: intrusion tolerance, distributed system, proactive recovery, resource-safety, network security
CLC Number:
ZHOU Hua;MENG Xiang-ru;ZHANG Li;QIAO Xiang-dong. Proactive recovery algorithm in the distributed intrusion-tolerance system [J].J4, 2009, 36(2): 378-384.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://journal.xidian.edu.cn/xdxb/EN/
https://journal.xidian.edu.cn/xdxb/EN/Y2009/V36/I2/378
Cited