DocumentCode
2015428
Title
Adaptive Hierarchical Intrusion Tolerant Model Based on Autonomic Computing
Author
Li, Bingyang ; Wang, Huiqiang ; Feng, Guangsheng
Author_Institution
Coll. of Comput. Sci. & Technol., Harbin Eng. Univ., Harbin, China
fYear
2008
fDate
13-15 Dec. 2008
Firstpage
137
Lastpage
141
Abstract
Intrusion tolerance has been a key technology of system survivability. Aiming at the absence of self-adaptation ability and quantitative analysis on existent intrusion tolerant system, an adaptive hierarchy intrusion tolerant system based on autonomic computing (AHITAC, for short) is proposed. Adopting hierarchy modes, the critical modules of AHITAC include confidence evaluation of accessing, active trapping on suspicious information, hierarchical learning of applications and classed recovery of system function. By autonomic implementing the learning and adaptive function of confidence threshold, service classification and trap repository, AHITAC implements the tolerance on intrusion and suspicious information, improving the ability of self-recovery and self-optimization on object network. The simulation results show that the object network with AHITAC is stable and tolerant.
Keywords
fault tolerant computing; security of data; system recovery; telecommunication security; unsupervised learning; adaptive hierarchical intrusion tolerant system; autonomic computing; confidence threshold; information security technology; network security; self-adaptation ability; self-adaptive hierarchical learning; service classification; suspicious information trap repository; system recovery; system survivability; Adaptive systems; Automatic testing; Computer science; Computer security; Control systems; Cryptography; Data security; Educational institutions; Information security; National security; Autonomic Computing; Confidence Evaluation; Intrusion Tolerance; trapping Mechanism;
fLanguage
English
Publisher
ieee
Conference_Titel
Security Technology, 2008. SECTECH '08. International Conference on
Conference_Location
Hainan Island
Print_ISBN
978-0-7695-3486-2
Type
conf
DOI
10.1109/SecTech.2008.24
Filename
4725362
Link To Document